Overview of NXP MIFARE product portfolio. Product families include: MIFARE Classic, MIFARE Plus, MIFARE DESFire and MIFARE Ultralight. Details the evolution and innovation of the various product families are given.
1 importance of light weight authentication in iotChintan Patel
1. The document summarizes key concepts related to Internet of Things (IoT) including definitions of IoT, the layered architecture of IoT, and security challenges in IoT.
2. It discusses IoT authentication approaches including device-to-device and global authentication as well as lightweight cryptography algorithms used for authentication and encryption in resource-constrained IoT devices.
3. The document also covers elliptic curve cryptography and its role in IoT security.
Smart mobility in the financial sector has helped financial institutions to reach millions of customers through mobile services. Mobility adoption has helped financial industry to provide enhanced services to their customers like mobile banking, mobile money, mobile payment of utility bills, and much more.
Government Developed ATM Machine those people who do not a stand for a rank of row. Maximum People is attract this system because it is time consuming and user friendly. Government provide many security of that system like, ATM Card No., PIN No
This document provides an overview of the Ethereum blockchain platform and smart contracts. It discusses what Ethereum is, how it works, and its key components. The document covers Ethereum wallets, transactions, tokens, and the Solidity programming language for building smart contracts. It provides information on running Ethereum nodes, clients, and testnets. The document serves as training material for a blockchain specialist program.
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
This complete deck covers various topics and highlights important concepts. It has PPT slides which cater to your business needs. This complete deck presentation emphasizes Distributed Ledger Technology Powerpoint Presentation Slides and has templates with professional background images and relevant content. This deck consists of total of twentytwo slides. Our designers have created customizable templates, keeping your convenience in mind. You can edit the colour, text and font size with ease. Not just this, you can also add or delete the content if needed. Get access to this fully editable complete presentation by clicking the download button below.
Blockchain Developments is building a comprehensive solution for Supply chain, Politics, Decentralized currency, Financial Technology, Healthcare, Infrastructure, and other business verticals. Read our blockchain case studies and use cases of successful implementations of blockchain development solutions for our various clients.
Ketan Bhagawat Sawakare will be giving a seminar presentation on biometrics technology. The presentation will include an introduction to biometrics, a history of biometrics, different types of biometrics such as fingerprint recognition and facial recognition, how biometrics systems work, advantages and disadvantages of biometrics, and applications and future scope of biometrics technology. The presentation will conclude with references used in preparing the seminar.
1 importance of light weight authentication in iotChintan Patel
1. The document summarizes key concepts related to Internet of Things (IoT) including definitions of IoT, the layered architecture of IoT, and security challenges in IoT.
2. It discusses IoT authentication approaches including device-to-device and global authentication as well as lightweight cryptography algorithms used for authentication and encryption in resource-constrained IoT devices.
3. The document also covers elliptic curve cryptography and its role in IoT security.
Smart mobility in the financial sector has helped financial institutions to reach millions of customers through mobile services. Mobility adoption has helped financial industry to provide enhanced services to their customers like mobile banking, mobile money, mobile payment of utility bills, and much more.
Government Developed ATM Machine those people who do not a stand for a rank of row. Maximum People is attract this system because it is time consuming and user friendly. Government provide many security of that system like, ATM Card No., PIN No
This document provides an overview of the Ethereum blockchain platform and smart contracts. It discusses what Ethereum is, how it works, and its key components. The document covers Ethereum wallets, transactions, tokens, and the Solidity programming language for building smart contracts. It provides information on running Ethereum nodes, clients, and testnets. The document serves as training material for a blockchain specialist program.
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
This complete deck covers various topics and highlights important concepts. It has PPT slides which cater to your business needs. This complete deck presentation emphasizes Distributed Ledger Technology Powerpoint Presentation Slides and has templates with professional background images and relevant content. This deck consists of total of twentytwo slides. Our designers have created customizable templates, keeping your convenience in mind. You can edit the colour, text and font size with ease. Not just this, you can also add or delete the content if needed. Get access to this fully editable complete presentation by clicking the download button below.
Blockchain Developments is building a comprehensive solution for Supply chain, Politics, Decentralized currency, Financial Technology, Healthcare, Infrastructure, and other business verticals. Read our blockchain case studies and use cases of successful implementations of blockchain development solutions for our various clients.
Ketan Bhagawat Sawakare will be giving a seminar presentation on biometrics technology. The presentation will include an introduction to biometrics, a history of biometrics, different types of biometrics such as fingerprint recognition and facial recognition, how biometrics systems work, advantages and disadvantages of biometrics, and applications and future scope of biometrics technology. The presentation will conclude with references used in preparing the seminar.
This document discusses SWIFT's gpi for corporates initiative, which aims to improve cross-border payments by providing faster processing, end-to-end tracking, transparency of fees, and full remittance data. It highlights challenges faced by corporate treasurers related to visibility, speed, and fees. It then outlines the benefits gpi provides and how it works by ensuring same-day use of funds, traceability, transparency of fees, and full transmission of remittance data. The document concludes by noting the growing adoption of gpi by banks and countries and its success in speeding up payments.
This document discusses various biometric security systems used for identification and verification. It describes physiological biometrics like fingerprint, iris, retina, and facial recognition that analyze unique physical characteristics. It also covers behavioral biometrics like signature, voice recognition, and hand geometry that analyze unique behavioral characteristics. For each biometric method, it explains how the technology works, its accuracy, advantages and limitations. It emphasizes that multimodal biometric systems integrating multiple technologies provide more secure authentication.
ISO 8583 is an international standard for financial transaction card originated messages. It defines the interchange message format and content between automatic teller machines and payment card networks. The standard specifies a message type identifier, bitmaps to indicate included data elements, and up to 127 data elements containing transaction details. An ISO 8583 message facilitates electronic payment processing by transmitting necessary information through a network.
The document summarizes the key aspects of the Cheque Truncation System (CTS) implemented in India. It provides details on:
1) How CTS works by stopping physical movement of cheques and transmitting electronic images instead, allowing for faster clearance cycles.
2) The benefits of CTS for customers including faster clearance, reduced risk of cheque loss or fraud, and early detection of alterations.
3) Security features of CTS like use of Public Key Infrastructure and standardized cheque formats to facilitate image processing.
The presentation was used during the keynote session in the Blockchain DLT Summit at Lima, Peru (November 14). Thanks to the summit sponsors UTEC, R3, BCP, and Microsoft Peru.
This document discusses using biometrics for payment authentication. It introduces 3-D Secure protocols for cardholder authentication during e-commerce transactions. Sample biometric use cases are presented, including simple app login, step-up authentication for online transactions, and step-up authentication for account changes. The Visa ID Intelligence Biometrics service is described as a one-stop solution for biometric authentication that is FIDO Alliance certified. Out-of-band step-up authentication is proposed as a way to streamline 3-D Secure using biometrics on a mobile device.
Abstract
The advancement in new technologies has significantly resulted more perfection in authentication issues. In ATM machine, access
permission is usually taking personal identification numbers (PIN) for authentication. Through this paper, this old method is
being exhausted by introducing a combination of embedded 3 layered bio-metric molding to setup an ATM simulator. Finger print
scanner, retina scanner followed by the onetime password (OTP) will help the user for smart and secured tractions. It will
reduced the duplication and makes the ATM machine more secured compare to current version.
Keywords: ATM, Biometric Security, OTP, Duplication Free, Retina Scanner.
The document provides information about mobile platforms and applications. It discusses mobile device operating systems, their special constraints and requirements. It describes commercial mobile operating systems like iOS, Android, Blackberry and Windows Phone. It covers mobile commerce structure and pros and cons. It discusses mobile payment systems and related security issues. It focuses on different mobile platforms, their application development kits and features of the Android operating system. Specifically, it provides details about the Android architecture including its software stack, application components and SDK.
IRJET- Blockchain based Fake Product Identification in Supply ChainIRJET Journal
The document proposes a blockchain-based system to identify fake products in the supply chain. The system uses Interplanetary File System (IPFS) to store product data in a distributed manner and maintain ownership records. A QR code is assigned to each product to provide customers access to information about the product's manufacturer, transaction history, and current owner. This allows customers to verify the authenticity and legitimacy of products. The system aims to improve transparency in supply chain management and enable easy identification of counterfeit goods.
Iot attendance system using fingerprint module AjinkyaMore29
An Internet of Things (IoT) based portable biometric
attendance system can prove to be of great value to educational institutions in
this regard as it proves to be highly efficient and secure. The cost involved in
making this system is quite less, when compared to conventional biometric
attendance system. The use of cloud computing to store the attendance records
makes all the data easy to access and retrieve as end when required by the
teachers. The use of fingerprint scanner ensures the reliability of the attendance
record.
2D mapping using omni-directional mobile robot equipped with LiDARTELKOMNIKA JOURNAL
This document describes research on using an omni-directional mobile robot equipped with a LiDAR sensor to perform 2D mapping of indoor environments. The robot uses a Raspberry Pi single board computer to process LiDAR data from a YDLiDAR X4 sensor and send it wirelessly to another computer running ROS. The Hector SLAM algorithm is used to determine the robot's position through scan matching and represent obstacles in an occupancy grid map. Experimental results showed the robot could follow walls using PID control and autonomously construct an accurate map of a room with an error rate of 4.59%.
The document discusses using handwritten signature verification as an additional security measure for computer systems. It notes that signature verification must be cheap, reliable, and unobtrusive. It explains that online signature verification analyzes dynamic features of signing, like speed and pressure, which presents challenges in differentiating consistent versus varying behavioral elements of a person's signature over time. The document outlines the signature acquisition and identification process using global features and training models, and notes the benefits of low error rates, ability to detect forgery even with copied signatures, fast training, and cheap storage requirements.
This document discusses security concerns related to cryptocurrencies. It begins by defining cryptocurrency as a digital currency created through mathematical algorithms that aims to be open, anonymous, secure and bypass traditional financial systems. It then outlines some key advantages of cryptocurrency over traditional money, such as maintaining user anonymity. However, it also identifies several security concerns with cryptocurrencies, such as selfish mining that allows miners to gain more revenue than their share of computing power, double spending of coins, and attacks on wallet software or acquiring over 50% of a cryptocurrency's computing power.
The document discusses biometrics and fingerprint recognition technologies. It provides an overview of why biometrics are needed due to vulnerabilities in traditional identity methods like passwords. It then describes different biometric modalities like fingerprints, facial recognition, iris scanning, and compares their characteristics. The document explains how fingerprint recognition works from image capture to matching. It outlines fingerprint matching algorithms and challenges. Finally, it discusses applications of fingerprint biometrics and provides a brief history of biometrics.
Ethereum is a decentralized platform that runs smart contracts and distributed applications. It provides a programmable blockchain that anyone can use. Ethereum launched in 2015 and enables peer-to-peer transactions through digital tokens called Ether. Unlike Bitcoin, Ethereum supports smart contracts and distributed applications through an Ethereum Virtual Machine. Common tools for developing on Ethereum include Solidity for writing smart contracts, Geth and Parity for running nodes, and Metamask for interacting with dApps. Tokens on Ethereum can represent various assets and functions like currencies, shares, voting rights, and access to services.
One Time Password - A two factor authentication systemSwetha Kogatam
This document provides an overview of one-time passwords (OTP), including a brief history, benefits and costs, categories, generation methods like HOTP and TOTP, delivery methods, relevant RFCs and standards, potential attacks, and development libraries. It defines an OTP as a single-use password or code used to authenticate over untrusted channels, complementing a user password for two-factor authentication. Common OTP types are event-based HOTP, which uses a HMAC to generate codes based on a key and counter, and time-based TOTP, which extends HOTP to generate codes based on time.
1. The document describes an IoT-based student attendance system that uses fingerprint recognition to identify students and automatically record attendance in real-time.
2. The system uses an ESP8266 microcontroller connected to WiFi to send student fingerprint IDs to a server when scanned. The server then updates attendance records and calculates percentages.
3. Students and teachers can check attendance and assignments in real-time through a mobile app, improving accuracy over traditional paper-based systems while saving time.
Everyone wants a better and secure career. As blockchain is now taking over the world, many companies are offering a secured and luxurious career for skilled blockchain engineers. Blockchain is a new type of technology, and there's a lot of opportunity in this field for developing a good career.
Blockchain engineer jobs demand the best of the best experts. They are expected to possess specialized skillsets. These Blockchain engineer skills mainly include knowledge about blockchain basics, blockchain architecture, data structures, cryptography, web development, and so on.
With proper skills, a blockchain engineer's salary can go up to 190k every year! However, completing a course dedicated to blockchain engineers can help in showcasing your skillsets.
This is where 101 Blockchains come into play —101 Blockchain stive to offer educative professionals courses and training specifically for engineers. If you want to become a blockchain engineer, getting a certification from 101 Blockchains can jump-start the process.
Our certification courses are ->
Our Certified Enterprise Blockchain Professional (CEBP)
https://academy.101blockchains.com/courses/blockchain-expert-certification
Our Certified Enterprise Blockchain Architect (CEBA)
https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect
Certified Blockchain Security Architect (CBSE)
https://academy.101blockchains.com/courses/certified-blockchain-security-expert
Our other courses can help you become the ultimate expert on blockchain. These are ->
How to Build Your Career in Enterprise Blockchains
https://academy.101blockchains.com/courses/career-in-blockchain
Getting Started with Hyperledger Fabric Course
https://academy.101blockchains.com/courses/getting-started-with-hyperledger-fabric/
Beginner's Guide to Corda Development Course
https://academy.101blockchains.com/courses/beginners-guide-to-corda-development
Ethereum Development Fundamentals Course
https://academy.101blockchains.com/courses/ethereum-development-fundamentals
This document summarizes Mifare Classic security analysis conducted in the Czech and Slovak republics. It discusses vulnerabilities found in Slovak Mifare Classic cards, including all tested cards using the same keys for the first 1024 bytes and at least one sector being encrypted with default keys. It also describes tools used in Mifare Classic attacks, such as Proxmark3 and Crapto1, and how all data on a Mifare Classic card can be cloned due to weaknesses in the authentication and encryption.
Near field communication (nfc) technologyAnkur Sharma
Near Field Communication (NFC) is a short-range wireless connectivity technology that allows data exchange between devices within 20 centimeters. NFC operates at 13.56 MHz and uses magnetic field induction to transfer data between an NFC reader/writer and an NFC tag. NFC enables contactless payment systems, data sharing between devices with a tap, and access to digital content, tickets or doors with NFC-enabled phones and tags. The future of NFC looks promising as more devices and payment terminals are being equipped with NFC technology.
This document discusses SWIFT's gpi for corporates initiative, which aims to improve cross-border payments by providing faster processing, end-to-end tracking, transparency of fees, and full remittance data. It highlights challenges faced by corporate treasurers related to visibility, speed, and fees. It then outlines the benefits gpi provides and how it works by ensuring same-day use of funds, traceability, transparency of fees, and full transmission of remittance data. The document concludes by noting the growing adoption of gpi by banks and countries and its success in speeding up payments.
This document discusses various biometric security systems used for identification and verification. It describes physiological biometrics like fingerprint, iris, retina, and facial recognition that analyze unique physical characteristics. It also covers behavioral biometrics like signature, voice recognition, and hand geometry that analyze unique behavioral characteristics. For each biometric method, it explains how the technology works, its accuracy, advantages and limitations. It emphasizes that multimodal biometric systems integrating multiple technologies provide more secure authentication.
ISO 8583 is an international standard for financial transaction card originated messages. It defines the interchange message format and content between automatic teller machines and payment card networks. The standard specifies a message type identifier, bitmaps to indicate included data elements, and up to 127 data elements containing transaction details. An ISO 8583 message facilitates electronic payment processing by transmitting necessary information through a network.
The document summarizes the key aspects of the Cheque Truncation System (CTS) implemented in India. It provides details on:
1) How CTS works by stopping physical movement of cheques and transmitting electronic images instead, allowing for faster clearance cycles.
2) The benefits of CTS for customers including faster clearance, reduced risk of cheque loss or fraud, and early detection of alterations.
3) Security features of CTS like use of Public Key Infrastructure and standardized cheque formats to facilitate image processing.
The presentation was used during the keynote session in the Blockchain DLT Summit at Lima, Peru (November 14). Thanks to the summit sponsors UTEC, R3, BCP, and Microsoft Peru.
This document discusses using biometrics for payment authentication. It introduces 3-D Secure protocols for cardholder authentication during e-commerce transactions. Sample biometric use cases are presented, including simple app login, step-up authentication for online transactions, and step-up authentication for account changes. The Visa ID Intelligence Biometrics service is described as a one-stop solution for biometric authentication that is FIDO Alliance certified. Out-of-band step-up authentication is proposed as a way to streamline 3-D Secure using biometrics on a mobile device.
Abstract
The advancement in new technologies has significantly resulted more perfection in authentication issues. In ATM machine, access
permission is usually taking personal identification numbers (PIN) for authentication. Through this paper, this old method is
being exhausted by introducing a combination of embedded 3 layered bio-metric molding to setup an ATM simulator. Finger print
scanner, retina scanner followed by the onetime password (OTP) will help the user for smart and secured tractions. It will
reduced the duplication and makes the ATM machine more secured compare to current version.
Keywords: ATM, Biometric Security, OTP, Duplication Free, Retina Scanner.
The document provides information about mobile platforms and applications. It discusses mobile device operating systems, their special constraints and requirements. It describes commercial mobile operating systems like iOS, Android, Blackberry and Windows Phone. It covers mobile commerce structure and pros and cons. It discusses mobile payment systems and related security issues. It focuses on different mobile platforms, their application development kits and features of the Android operating system. Specifically, it provides details about the Android architecture including its software stack, application components and SDK.
IRJET- Blockchain based Fake Product Identification in Supply ChainIRJET Journal
The document proposes a blockchain-based system to identify fake products in the supply chain. The system uses Interplanetary File System (IPFS) to store product data in a distributed manner and maintain ownership records. A QR code is assigned to each product to provide customers access to information about the product's manufacturer, transaction history, and current owner. This allows customers to verify the authenticity and legitimacy of products. The system aims to improve transparency in supply chain management and enable easy identification of counterfeit goods.
Iot attendance system using fingerprint module AjinkyaMore29
An Internet of Things (IoT) based portable biometric
attendance system can prove to be of great value to educational institutions in
this regard as it proves to be highly efficient and secure. The cost involved in
making this system is quite less, when compared to conventional biometric
attendance system. The use of cloud computing to store the attendance records
makes all the data easy to access and retrieve as end when required by the
teachers. The use of fingerprint scanner ensures the reliability of the attendance
record.
2D mapping using omni-directional mobile robot equipped with LiDARTELKOMNIKA JOURNAL
This document describes research on using an omni-directional mobile robot equipped with a LiDAR sensor to perform 2D mapping of indoor environments. The robot uses a Raspberry Pi single board computer to process LiDAR data from a YDLiDAR X4 sensor and send it wirelessly to another computer running ROS. The Hector SLAM algorithm is used to determine the robot's position through scan matching and represent obstacles in an occupancy grid map. Experimental results showed the robot could follow walls using PID control and autonomously construct an accurate map of a room with an error rate of 4.59%.
The document discusses using handwritten signature verification as an additional security measure for computer systems. It notes that signature verification must be cheap, reliable, and unobtrusive. It explains that online signature verification analyzes dynamic features of signing, like speed and pressure, which presents challenges in differentiating consistent versus varying behavioral elements of a person's signature over time. The document outlines the signature acquisition and identification process using global features and training models, and notes the benefits of low error rates, ability to detect forgery even with copied signatures, fast training, and cheap storage requirements.
This document discusses security concerns related to cryptocurrencies. It begins by defining cryptocurrency as a digital currency created through mathematical algorithms that aims to be open, anonymous, secure and bypass traditional financial systems. It then outlines some key advantages of cryptocurrency over traditional money, such as maintaining user anonymity. However, it also identifies several security concerns with cryptocurrencies, such as selfish mining that allows miners to gain more revenue than their share of computing power, double spending of coins, and attacks on wallet software or acquiring over 50% of a cryptocurrency's computing power.
The document discusses biometrics and fingerprint recognition technologies. It provides an overview of why biometrics are needed due to vulnerabilities in traditional identity methods like passwords. It then describes different biometric modalities like fingerprints, facial recognition, iris scanning, and compares their characteristics. The document explains how fingerprint recognition works from image capture to matching. It outlines fingerprint matching algorithms and challenges. Finally, it discusses applications of fingerprint biometrics and provides a brief history of biometrics.
Ethereum is a decentralized platform that runs smart contracts and distributed applications. It provides a programmable blockchain that anyone can use. Ethereum launched in 2015 and enables peer-to-peer transactions through digital tokens called Ether. Unlike Bitcoin, Ethereum supports smart contracts and distributed applications through an Ethereum Virtual Machine. Common tools for developing on Ethereum include Solidity for writing smart contracts, Geth and Parity for running nodes, and Metamask for interacting with dApps. Tokens on Ethereum can represent various assets and functions like currencies, shares, voting rights, and access to services.
One Time Password - A two factor authentication systemSwetha Kogatam
This document provides an overview of one-time passwords (OTP), including a brief history, benefits and costs, categories, generation methods like HOTP and TOTP, delivery methods, relevant RFCs and standards, potential attacks, and development libraries. It defines an OTP as a single-use password or code used to authenticate over untrusted channels, complementing a user password for two-factor authentication. Common OTP types are event-based HOTP, which uses a HMAC to generate codes based on a key and counter, and time-based TOTP, which extends HOTP to generate codes based on time.
1. The document describes an IoT-based student attendance system that uses fingerprint recognition to identify students and automatically record attendance in real-time.
2. The system uses an ESP8266 microcontroller connected to WiFi to send student fingerprint IDs to a server when scanned. The server then updates attendance records and calculates percentages.
3. Students and teachers can check attendance and assignments in real-time through a mobile app, improving accuracy over traditional paper-based systems while saving time.
Everyone wants a better and secure career. As blockchain is now taking over the world, many companies are offering a secured and luxurious career for skilled blockchain engineers. Blockchain is a new type of technology, and there's a lot of opportunity in this field for developing a good career.
Blockchain engineer jobs demand the best of the best experts. They are expected to possess specialized skillsets. These Blockchain engineer skills mainly include knowledge about blockchain basics, blockchain architecture, data structures, cryptography, web development, and so on.
With proper skills, a blockchain engineer's salary can go up to 190k every year! However, completing a course dedicated to blockchain engineers can help in showcasing your skillsets.
This is where 101 Blockchains come into play —101 Blockchain stive to offer educative professionals courses and training specifically for engineers. If you want to become a blockchain engineer, getting a certification from 101 Blockchains can jump-start the process.
Our certification courses are ->
Our Certified Enterprise Blockchain Professional (CEBP)
https://academy.101blockchains.com/courses/blockchain-expert-certification
Our Certified Enterprise Blockchain Architect (CEBA)
https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect
Certified Blockchain Security Architect (CBSE)
https://academy.101blockchains.com/courses/certified-blockchain-security-expert
Our other courses can help you become the ultimate expert on blockchain. These are ->
How to Build Your Career in Enterprise Blockchains
https://academy.101blockchains.com/courses/career-in-blockchain
Getting Started with Hyperledger Fabric Course
https://academy.101blockchains.com/courses/getting-started-with-hyperledger-fabric/
Beginner's Guide to Corda Development Course
https://academy.101blockchains.com/courses/beginners-guide-to-corda-development
Ethereum Development Fundamentals Course
https://academy.101blockchains.com/courses/ethereum-development-fundamentals
This document summarizes Mifare Classic security analysis conducted in the Czech and Slovak republics. It discusses vulnerabilities found in Slovak Mifare Classic cards, including all tested cards using the same keys for the first 1024 bytes and at least one sector being encrypted with default keys. It also describes tools used in Mifare Classic attacks, such as Proxmark3 and Crapto1, and how all data on a Mifare Classic card can be cloned due to weaknesses in the authentication and encryption.
Near field communication (nfc) technologyAnkur Sharma
Near Field Communication (NFC) is a short-range wireless connectivity technology that allows data exchange between devices within 20 centimeters. NFC operates at 13.56 MHz and uses magnetic field induction to transfer data between an NFC reader/writer and an NFC tag. NFC enables contactless payment systems, data sharing between devices with a tap, and access to digital content, tickets or doors with NFC-enabled phones and tags. The future of NFC looks promising as more devices and payment terminals are being equipped with NFC technology.
The document provides information on Mifare contactless smart cards, including:
- Mifare 1K and 4K cards comply with ISO 14443 standards and have cryptographic authentication and encrypted communication between the card and reader.
- The cards have an EEPROM memory divided into sectors and blocks, with a security block defining access conditions for each data block.
- Java card chips can emulate Mifare functionality, but compatibility issues can occur if the emulated card claims to not support ISO 14443-4.
This document provides an introduction and overview of Near Field Communication (NFC) technology. It discusses NFC use cases and the technical details of NFC, including the different tag types, specifications, and communication modes. It then focuses on how NFC is implemented on Android devices, explaining how the tag dispatch system works to retrieve data from NFC tags and route intents to the appropriate applications based on the data and intent filters. Examples are provided of creating NDEF messages and corresponding intent filters for different data types.
NFC (Near Field Communication) is a short-range wireless communication technology that allows data exchange between devices over short distances typically less than 20 cm. It uses radio frequency identification (RFID) standards to establish communication by bringing two enabled devices in close proximity. Common applications of NFC include contactless payment, data sharing and connectivity with smart posters, tags, or cards. Security is a concern for NFC since communications can potentially be intercepted, though using higher-level encryption protocols can help address this.
[Presentation from May 14 Tap into NFC Meetup]
At the Tap into NFC Meetup in Boston on May 14, 2015, attendees learned about NFC technology and where the Internet of Things is headed in 2015 and beyond. Slide deck includes:
-NFC ecosystem overview + Why NFC Should be on Your Radar ~ Paula Hunter, Executive Director, NFC Forum
-NFC Everywhere – bringing new, secure and convenient user experiences and enabling the Internet of Things with a simple touch of your mobile device ~ Suresh Palliparambil, NXP
-Lightning talks from Identiv, TapTrack, Purple Deck Media, and Couchbase
Get involved in or meet us at one of our upcoming events: http://nfc-forum.org/nfc-forum-events/
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPDroidcon Berlin
NFC, the intuitive contactless technology is finding its way into more and more mobile phone devices. NFC stands for Near Field Communication and is a contactless technology gearing to massively ease information gathering and content sharing. It's very easy to use and allows short range, point to point communication between NFC enabled devices as well as access to content on passive tags and cards. The presentation will focus to provide a technology introduction, some hints on already available applications with a life demonstration of the technology. We will discuss the use cases driving the technology, the level of NFC integration in Android. The NCF API and it's classes will be presented and last but not least we plan to run a little life coding session to show how easy applications can be enabled and can benefit from NFC.
Near Field Communication (NFC) technology allows for short-range wireless data transfer between devices when they are brought within close proximity of a few centimeters. NFC uses magnetic field induction to enable communication between NFC-enabled devices and is compatible with existing RFID infrastructure. Current and anticipated applications of NFC include contactless payments, transport fares, exchanging contact information, accessing digital content, and more. While providing convenient connectivity, NFC also faces security threats like eavesdropping and data modification if not implemented securely.
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...ST_World
The document summarizes how NFC dynamic tags can simplify the setup and use of IoT devices. It discusses how NFC helps with commissioning devices by providing a standard way to connect them to networks and write credentials. NFC also aids in connecting devices to Bluetooth and WiFi networks by encoding connection details on tags. Interacting with tags allows controlling headless devices for configuration and data retrieval. The document concludes that NFC's ease of use, security, and low cost make it a promising technology for simplifying IoT adoption challenges around connectivity and control of devices.
NFC Development with Qt - v2.2.0 (5. November 2012)Andreas Jakl
Learn developing Near Field Communication (NFC) apps for Nokia's Symbian and MeeGo phones with step-by-step tutorials!
The three development options Qt, Symbian native and Java ME are outlined. A more detailed explanation shows the Qt Mobility 1.2 APIs to create modern NFC applications for smartphones.
In the final part, step-by-step hands-on tutorials walk you through developing your first two NFC apps. The first demo extends an example from the Qt SDK with reading & writing both URI and text NDEF records to create new sticky notes on the virtual corkboards visible on the screen. The second demo uses the LLCP protocol to create a peer-to-peer chat application between two NFC Forum compatible devices.
On Relaying NFC Payment Transactions using Android devicescgvwzq
NFC (Near Field Communication) defines the set of RFID standards designed to bidirectionally communicate via wireless and interchange data point-to-point between devices in proximity, normally a few centimeters (up to 10cm). Services that use NFC communications as contactless payments are exponentially growing: Public transport, parkings, fast supermarket cashers, vending machines and even NFC-capable credit/debit cards.In this talk, we investigate relay attacks in NFC-capable credit/debit cards. This attack exploits the communication proximity principle in NFC, which is shown to be non secure. Although a lot of attack countermeasures exist, they do not face with this attack vector since up to date special hardware was required to perform it. However, the story is rewritten with the NFC-capable mobile devices available in the market.
This work shows how nowadays a relay attack in NFC-capable credit/debit cards is possible using an NFC-capable Android device without further modifications (i.e., no root permissions, custom firmware, or custom OS are required). A PoC app implementing the attack is shown in the talk, as well as distributed relay attack scenarios that might become real before long.
Near field communication (NFC) allows short-range wireless communication between devices when they are brought within close proximity of a few inches. It was established as a standard in 2004 and the first NFC phone was released in 2006. NFC operates at 13.56 MHz and has a theoretical range of about 4 cm. It can be used to transfer contact information, URLs, initiate Bluetooth connections, and for contactless payments. While NFC provides convenience, its adoption has been limited due to lack of agreement between companies and some security concerns exist. Alternatives to NFC include digital wallets that are accessible from multiple devices.
NFC, or Near Field Communication, is a short-range wireless communication technology that allows data exchange between devices when they are touched or brought within close proximity of each other. It operates at 13.56 MHz and has a maximum range of about 10 cm. NFC uses magnetic field induction to enable communication between two devices. One device must have an NFC reader/writer while the other contains an NFC tag. Common applications of NFC include contactless payments, data sharing, and connection handovers to establish wireless links between devices. The technology is standardized by the NFC Forum and is seeing increasing adoption in smartphones and other mobile devices.
ACR122L is a plug-and-play device that does not require any driver installation. It is a serial interface NFC contactless reader with LCD developed based on the 13.56 MHz RFID technology and the ISO/IEC 18092 NFC standard, and supports ISO 14443 Type A and B cards, Mifare, and all four types of NFC tags.
This document discusses cloning cryptographic RFID cards cheaply. It describes motivating real-world attacks on access control and payment systems that use RFID cards. It then provides details on popular RFID card standards like Mifare Classic and DESFire, explaining known vulnerabilities. The document introduces a $25 programmable RFID cloning device that can emulate these cards to support penetration testing and fraud. It concludes by discussing potential real-world attacks using such a device.
NFC technology allows for contactless information exchange through wireless communication over short ranges. It can enable functions like mobile payments, ticketing, and data sharing. Nokia has been a leader in NFC, having introduced some of the first NFC-enabled phones and participating in many commercial deployments and trials around the world. These trials showed strong consumer interest in NFC services and indicated that sufficient payment infrastructure and an easy user experience are important for adoption.
New use cases thanks to adding crypto to RFID tagsIhar Bayarenka
Presentation from technology seminar in Jakarta, Feb 2017. Describing new use cases that are made possible when cryptographic authentication is added to long range RFID tags in HF and UHF frequency bands (ICODE DNA and UCODE DNA, respectively)
Catalogue european countries may 2019_compressedMauricio Conus
The document is a catalog for security products from Provision-ISR, an Israeli company. It includes cameras, video servers, network video recorders, digital video recorders, switches, accessories, and the Ossia operating system. Ossia is the latest OS for Provision-ISR's DVR/NVR systems, offering full compatibility with their IP cameras and control over features through an intuitive interface. The catalog highlights Provision-ISR's range of solutions that can meet different security needs and budgets.
Track 2 session 4 - st dev con 2016 - opensoftwarexST_World
This document summarizes an agenda for an event on Open Software eXpansion. The agenda includes presentations on STM32's open development environment, open software expansion libraries for audio, sensors and RF, frameworks like BlueMicrosystem for Bluetooth and sensor applications, and the ecosystem of partners developing solutions with STM32 microcontrollers. The open software expansion aims to provide open licensing for value-added binary libraries to lower barriers for developers working with ST products. Diolan was highlighted as a partner providing a ready-made hardware solution called SensiBLE that is fully compatible with STM32 software and can be used for quick prototyping and small volume production.
NXP presentation at Secure Identifications 2016Ihar Bayarenka
NXP at Secure Identifications 2016 conference - market leadership, secure passive UHF tags for AVI applications, FIDO U2F tokens for secure access to government services online
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...NXP MIFARE Team
Discover how you can realize a smooth system migration of your contactless smart card system to a higher security level, including the benefits of using MIFARE Plus products.
SmartWorld is an ISO 9001:2008 IT solutions provider focused in card solutions and secure identification domain. With expertise in card personalization solutions , EMV Testing Tools & Consultancy , e-security & physical access control products, logical access control solutions, SmartWorld provides unrivalled customer service by truly understanding unique secure identification needs. With a passion for providing high quality, innovative products, and an in-depth understanding of the solution application, SmartWorld has earned a name as a trusted identification expert.
SmartWorld has partnered with leading brands such as MAGICARD , CARD EXCHANGE , INGERSOLL RAND SECURITY TECHNOLOGIES , IDTECH etc that positions us to serve the needs of the customer providing turnkey solutions.
Specialties
MAGICARD ID Card Printers, SmartCard Readers, Card Management and Personalization, Schlage Access Control Readers, Badging Solutions, BRITON Electromagnetic Locks, EMV Testing tools, training & consultancy, MIFARE Encoding, Mobile Readers, Smartcard Encoding, NFC
Contact US: enquiries@smartworld.ae
Scati is a security company that provides comprehensive CCTV solutions. It has evolved from initially focusing on banking security to expanding globally and working on large-scale projects. Scati offers recording systems, cameras, networks, control centers and integrations. Notable capabilities include designing solutions for various industries, proprietary video management software, and developing customized solutions for large projects.
NXP Semiconductors is a global semiconductor company with a focus on identification technologies including RFID. They are a leader in various RFID markets including transportation, banking, eGovernment, and tagging. The document discusses NXP's product portfolio, the HF and UHF RFID technologies, important markets and applications, success stories with various customers, and future developments in areas like sensor interfaces and cryptographic processors.
The Falcon X3 is a ruggedized mobile computer that can scan barcodes and connect to wireless networks. It has a 3.5 inch touchscreen, full shift battery life, and can withstand drops of up to 6 feet. The device uses Datalogic's patented 'Green Spot' technology for scanning barcodes with a laser or 2D imager. It runs Windows Embedded Handheld or CE operating systems and includes software for development, deployment, and device management.
Abacus Infotech provides integrated security and technology solutions for businesses. They offer products like biometric and RFID attendance systems, CCTV security cameras, fire alarms, RFID solutions, electronic surveillance, and key and locker management. Their team of professionals can handle turnkey projects and customized solutions. Abacus aims to increase customers' security, productivity and compliance while saving them time and money through cutting-edge technology and services.
Sensor Access Technology Ltd is a British manufacturer and distributor of electronic access control equipment established in 1999 based in the UK with a worldwide dealership network. They offer a comprehensive range of standalone systems, PC-based systems, and integrated solutions including access control, parking management, lift control, CCTV integration, guard tour monitoring, crisis management, biometric integration, and intruder alarm integration. Their software provides powerful reporting, visitor management, time and attendance tracking, alarm control, and map integration.
This document discusses how RFID and NFC technologies can provide connectivity for the Internet of Things (IoT) over short distances. It outlines CISC Semiconductor's role in developing RFID and NFC standards through organizations like ISO, EPCglobal, and NFC Forum. The document also describes the importance of conformance, performance, and interoperability testing to ensure different RFID and NFC devices can reliably communicate and interact as required.
SE-4061, Low Power Yet Robust Biometric Fingerprint Technology, by Charles NgAMD Developer Central
This document summarizes a presentation given by Charles Ng, Head of US Operations at Fingerprint Cards (FPC), about how fingerprint authentication enables security, mobility and convenience. The presentation discusses how fingerprint sensors can securely unlock phones and provide access to a variety of online services like payments, social networks and cloud services without passwords. It provides an overview of FPC as a public company that develops patented fingerprint sensor technology. FPC's vision is to enable authentication beyond passwords and pins through their world-leading fingerprint sensors and partnerships.
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM France Lab
This document summarizes a presentation given by Sierra Wireless on their mangOH open source hardware platform, AirVantage IoT cloud platform, and a demo connecting a sensor to the cloud using these technologies. The presentation introduced mangOH as a flexible open source hardware solution for prototyping IoT devices, AirVantage as an end-to-end cloud platform for managing devices and applications, and demonstrated a simple sensor-to-cloud application using mangOH, AirVantage and IBM Bluemix. Representatives from Sierra Wireless discussed their solutions for building the Internet of Things.
The document summarizes Mirasys' product portfolio for video surveillance systems. It describes their NVR Pro and NVR Enterprise software solutions that range from single-server installations up to nationwide deployments. It also outlines their Carbon options that provide unlimited scalability through features like video analytics, video walls, and integration capabilities. Hardware platforms are carefully selected and range from entry-level systems like the HP 8300 to mid-range options such as the HP Z220 and high-end Dell R520 servers.
This document provides an overview of RFID security modules and discusses various RFID tag and reader technologies. It summarizes key RFID standards like ISO/IEC 14443 and describes common tag types, including HID Prox, MIFARE Ultralight, MIFARE Classic, and DESFire EV1. It also discusses relay attacks and ways they can be mitigated using distance bounding protocols.
NXP MIFARE Webinar: How To Protect Contactless Systems Today And TomorrowNXP MIFARE Team
This document discusses how to protect contactless systems both today and in the future. It begins by explaining basic password protection and its weaknesses. It then discusses additional security measures like two-factor authentication and encrypted password transmission. The document goes on to describe requirements for sustainable long-term security like backwards compatibility, updatability, and migration paths. It presents NXP's MIFARE Plus EV1 and DESFire EV2 products as solutions, highlighting features like selective security level switching and multiple rolling keysets that enable simplified security upgrades. The goal is to help users protect the value of their assets over the long term in a cost-effective manner.
SmartWorld is a leading IT solutions provider focused in card solutions and secure identification domain. With expertise in card personalization solutions , EMV Testing Tools & Consultancy , e-security & physical access control products, logical access control solutions, SmartWorld provides unrivalled customer service by truly understanding unique secure identification needs. With a passion for providing high quality, innovative products, and an in-depth understanding of the solution application, SmartWorld has earned a name as a Trusted Identification Expert.
Similar to NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside (20)
The SL1SL3MixMode feature of NXP’s MIFARE Plus EV2 IC allows to configure the IC to accept Crypto-1 as well as AES authentication on card or on sector-per-sector basis. With this, only security relevant applications can be upgraded to SL3, to enable new use cases such as for example Over-the-Air top-ups with an NFC-enabled mobile phone.
The Security Level (SL) concept of NXP’s MIFARE Plus EV2 IC allows for a step-by-step upgrade of the system’s security by switching only certain applications to a higher security level. The highest security level, SL3, offers support for AES-128 based secure messaging and thus helps to prove authenticity, confidentiality and integrity of transactions.
The Secure Dynamic Messaging (SDM) feature allows to program NXP’s MIFARE DESFire EV3 IC in a way to store NDEF messages as defined in the NFC Forum Tag Type 4 specification. A unique IC individual NDEF message is generated on each tap, whereas a backend server evaluates the data that was generated by the IC.
The Transaction MAC (TMAC) feature allows smart cards like MIFARE DESFire EV3 and MIFARE Plus EV2 to generate a message authentication code (MAC) for offline transactions between a reader terminal and the smart card. The TMAC helps establish trust by proving the authenticity and validity of transactions when reported to the backend system. It can detect fraudulent activities like replayed, forged, manipulated, or missing transactions by verifying the MAC covers all transaction details and is generated with a secure TMAC key. Technical details are provided on how to enable and use the TMAC feature for different applications and data blocks on each card.
The document discusses the transaction timer feature of MIFARE DESFire EV3 and MIFARE Plus EV2 contactless smart cards. The transaction timer allows a card issuer to configure a maximum time limit for transactions, to mitigate man-in-the-middle attacks. It works by automatically resetting the card and aborting the transaction if the time threshold is exceeded. Transaction timers can be set individually for each application. The feature enhances security without requiring changes to existing reader terminal infrastructures.
NTA's Leap Card - Expanding Ticketing while Shrinking CostsNXP MIFARE Team
In 2011, when Ireland’s National Transit Authority (NTA) introduced the Leap Card, a MIFARE® product-based smart card for securely purchasing, storing, and using transport tickets, people were immediately drawn to its convenience and ease of use.
By using NXP’s MIFARE® DESFire® EV1 contactless IC to power their Leap Cards, the NTA could take advantage of several features, and increasing their coverage while keeping infrastructure investments at bay.
NXP MIFARE Webinar: Complement Use Cases With Mobiles And WearablesNXP MIFARE Team
NXP MIFARE mobile solutions, explaining MIFARE4Mobile and how NXP has integrated mobiles and wearable technology into an ever increasing contactless world.
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment NXP MIFARE Team
This webinar shows you how you can use NXP's innovative MIFARE Plus and MIFARE DESFire products for secure closed loop payments in multi-vendor systems.
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Team
Discover how you can use NXP innovative MIFARE product's technology in access management applications, such as enterprises, campuses, or within the hospitality industry.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
2. Introduction
Access Management Webinar Series
Motivation
• Provide update on the MIFARE portfolio
• Provide update on latest features and
methods embedded in new products
Target Audience
• System Integrators
• Solution providers
• Credential manufacturers
Format
• Series of 8 webinars of 30´ duration each
• Addressing one industry challenge per
session
3. Agenda
1. MIFARE – Short history
2. MIFARE in Access Management
3. MIFARE Portfolio Overview
• ICODE Family
• MIFARE Ultralight Family
• MIFARE Classic Family
• MIFARE Plus Family
• MIFARE DESFire Family
• MIFARE Complementing products
Miriama Faberova
Marketing Manager
MIFARE Ultralight
Christoph Zwahlen
Marketing Manager
Access Management
Johannes Grüll
Marketing Manager
MIFARE Classic / MIFARE
Plus
9. “In the fields of physical security and information
security, access management is the selective
restriction of access to a place or other resource. The
act of accessing may mean consuming, entering, or
using. Permission to access a resource is called
authorization.”
Source: Wikipedia
ACCESS MANAGEMENT –
BEYOND SECURING THE DOOR
10. Access Management
Market Segments
June 22, 201611.
Enterprise
Access to corporate
facilities and services
including
• Access mgmt.
• Logical Access
• Resource mgmt.
• Payment
• Parking
• IT Services
Hospitality
Access to facilities and
services including
• Room Access
• Leisure facilities
• Parking
• Vending
Education
Access to campus
facilities and services
including
• Access mgmt.
• Logical Access
• Attendance ctrl.
• Payment
• IT Services
• Library services
Residential
Access to residential
buildings
• House
• Appartment building
• Residential complex
Leisure
Access to leisure
activities such as
• Theme park
• Fitness studio
• Stadium
• Event ticketing
• Waterpark and Spa
• Ski resorts
11. NXP Contactless Portfolio
Part of a broad portfolio of contactless solutions
June 22, 201612.
Operating Distance
10m+Up to 10cm >1,5m
13,56 MHz
ISO 18000-3
ISO 15693
EPC Class-1 HF
RFID
• Gaming & toys
• Brand protection
840-960 MHz
ISO 18000-6
UHF EPC G2
UHF EPC G2 V2
• Access
Management:
crowd control
and personalized
user experiences
13,56 MHz
ISO 14443
ISO 7816
Global Platform
• Access
Management:
Logical Access
combined with
Physical Access
13,56 MHz
ISO 14443
NFC Forum
• Consumer
Experience
• Device Pairing &
configuration
• Brand
Protection
• Gaming & toys
13,56 MHz
ISO 14443
ISO 7816
• Access
Management
• Event
Management
• Micropayment
• Loyalty
Platform
Operating
freq.
Standard
Apps
• Access
Management
ISO 14223
ISO 11784/85
125 kHz
12. MIFARE™ – 2 decades of innovation
June 22, 201614.
MIFARE DESFire EV2
MIFARE Plus EV1
MIFARE DESFire EV0 MIFARE DESFire EV1
MIFARE Classic
MIFARE Plus
MIFARE
Ultralight
MIFARE Ultralight C
1994 2011
Smart Paper
TicketsSmart Cards
Banking
Cards Mobile Phones
MIFARE Ultralight EV1
2015
MIFARE Classic EV1
2016
MIFARE Ultralight Nano
14. • ICODE is the leading Brand for high-frequency
(HF) smart label solutions with billions of ICs in the field and
thousands of successful installations.
• With NEW ICODE DNA, NXP revolutionize ICODE portfolio by
bringing the mutual AES cryptographic authentication to
enhance the security for vicinity applications.
• Moreover ICODE DNA offers easy cloud connectivity through
NFC phones to support convenient consumer engagement and
offers easy system integration thanks to a broad range of
supporting tools.
Enhanced Security for Vicinity
Applications
June 22, 201616.
16. • AES128 authentication compliant to ISO/IEC 15693-3 Amdmt. 4 (Ref. 5) and ISO/IEC 29167-10 (Ref. 6)
• 3 user keys for tag authentication and/or mutual authentication
• Separate privileges for different access rights per key
• Optional authentication limit
• 2016 bit user memory with flexible memory segmentation
• Originality signature (customer programmable)
• Privacy mode – no track and trace via UID
• Programmable Counter – command based counter increase/reset
• Fast read and persistent quiet mode for increase identification speed and inventory accuracy
• Improved RF performance
ICODE DNA main product features
June 22, 201618.
17. Hands-free access
Made for rough conditions – and unforgettable moments!
• Target applications
• Ski ticketing
• Attractions
• Event ticketing
• Flexible, secure and convenient solutions
• Enhance protection of business case
• Superior performance enabling more convenience in harsh
environments and small form factors
• Enrich visitors experience through NFC compatibility
• Easy integration to existing systems
• AES authentication ensures state of the are security and highest
performance in both HW and SW implementations
• Backwards compatible with existing systems
June 22, 201619.
19. 21
• MIFARE Ultralight is NXP’s well-known brand for single / limited
use tickets and cards
• MIFARE Ultralight based tickets are ideal for low-cost, high-volume
applications serving as the perfect contactless replacement for
magnetic stripe, barcode, pure printed tickets,…
• MIFARE Ultralight products comply with the international standard
ISO/IEC 14443, which is used in more than 80% of all contactless
smart cards today
• Backwards compatibility ensures that the existing infrastructure
can be smoothly upgraded
MIFARE Ultralight
Target applications and positioning
June 22, 2016
20. June 22, 201622.
Multiple sourcing on all
levels of the value-chain
(readers, cards, etc.)
Compliant to
>4 standards
and industry best
practices
NFC TagType2
4 family
members
& continuous development
Preferred solution
for smart paper ticketing with
> 80% market share
With the best RF performence
(ABI research 2013)
>6 Bilion pcs shipped
Powering paper Ticketing in
>100 cities
MIFARE Ultralight by numbers
21. • Convenience
Contactless technology improving guests experience
• Reliability
Dependable applications through field proven solutions
• Efficiency
Faster transactions reducing waiting times
• Cost effectiveness
Reduced maintenance costs for infrastructure
• Increased revenue
Increased guest satisfaction leads to additional spending
Benefits of contactless replacement
Enhancing guest experience
June 22, 201623.
22. 2002
MIFARE Ultralight
2009
MIFARE Ultralight C
2013
MIFARE Ultralight EV1
Q3 2016
MIFARE Ultralight NANO
June 22, 201624.
Continuous evolution of MIFARE Ultralight
ISO/IEC 14443 A 1-3 compliant
NFC forum tag type 2 compliant
Adding 3DES security
additional features:
• 1536 bits (192 bytes) EEPROM
• 16 bit counter
• 3DES authentication
• Cloning protection via authentication
key
Successor of MIFARE Ultralight
Ideal solution for limited use tickets
additional features:
• Two memory versions 48 Byte/128 Byte
• Lock Bits for memory write protection
• 3 independent 24-bit one-way counter
• configurable 32-bit password feature for
write or read/write protection
• ECC supported NXP originality check
The best contactless alternative to mag
stripe/ barcode/ QR Code & printed tickets
Cost down solution for the single use
tickets
features:
• 40 Byte memory version
• ECC supported NXP originality signature
(preprogramed by NXP, reprogrammable in the field
to own unique originality signature)
24. MIFARE Ultralight Family Comparison
MIFARE
Ultralight® MIFARE Ultralight Nano MIFARE Ultralight EV1 MIFARE Ultralight C
memory
40 bytes 48 / 128 bytes 144 bytes
OTP
32 bit 32 bit 32 bit
write lock
counter
3 x 24 bit 1 x 16 bit
access protection
32 bit Password 3DES
fast read
originality signature
Programmable
June 22, 201626.
27. MIFARE Ultralight Nano
Reprogrammable originality signature
June 22, 201629
• Based on MIFARE Ultralight EV1 NXP originality signature
• Differentiate tickets used in your system by using reprogrammable NXP Originality signature
• MIFARE Ultralight Nano ECC supported originality signature (programed by NXP, reprogrammable to own
unique originality signature)
• Develop Android applications for checking your own originality signature easily thanks to MIFARE SDK Android Libraries.
Distributed completely for free with
the upcoming product launch!
28. MIFARE Ultralight Nano – RELEASE Q3 2016
Release details:
• Engineering samples available end of Q2
• Release begining of Q3
• Mass production- end of Q3 2016
June 22, 201630.
32. 34
MIFARE Classic EV1
MIFARE Classic EV1
• The MIFARE Classic family is the market leading
most widely used contactless smart card ICs
operating in the 13.56 MHz frequency range with
read/write capability and ISO/IEC 14443 A
compliance.
MIFARE Classic EV1 replaces all previous MIFARE
Classic versions and offers:
Connectivity
optimized robustness,
assembly
and RF performance
Originality
signature
Check for
genuine products
40 different
applications
globally
Reliability,
Sustainability,
Maturity
continuos product advancements and
MIFARE compatibility ISO
14443
MIFARE
ClassicEV1
June 22, 2016
33. 35
Memory Structure – Linear Memory
16
bytes
Secto
r0
Secto
r1
……
…….
Block 0
Block 1
Block 2
Block
3
Block 0
Block 1
Block 2
Access Conditions Key
B
Key
A
Sector 0, Block 0 contains (N)UID
& production specific data
• for customer data
• for values (enables value
operations)
Sector
Trailer
MIFARE Classic
48-bit Crypto1
June 22, 2016
35. 37
MIFARE DESFire EV2
MIFARE Plus EV1
MIFARE® – 2 decades of innovation
MIFARE DESFire EV0 MIFARE DESFire EV1
MIFARE Classic
MIFARE Plus
MIFARE Ultralight
MIFARE Ultralight C
1994 2011
Smart Paper
TicketsSmart Cards
Banking
Cards Mobile Phones
MIFARE Ultralight EV1
2015
MIFARE Plus SE
MIFARE Classic EV1
36. 38
Get AES security in existing MIFARE Classic® cards
budgets
Be protected from clones
Upgrade smoothly within the MIFARE® product
family
Enjoy optimized transaction performance
Implement NFC capabilities at highest security level
Introducing MIFARE Plus®
June 22, 2016
37. 39
SL1 = MIFARE Plus® in Crypto1
mode +
existing MIFARE Classic® cards
SL3 =
MIFARE Plus® with
AES security
SL0 = Virgin
MIFARE Plus®
• Functional backwards
compatible with MIFARE
Classic
• AES for authentication,
integrity
• Multi sector authentication
• Optional Random ID
• Anti-tearing for keys &
sector trailers
Key features per level
• Program AES level
switching keys (mandatory)
• Program Crypto 1 and AES
keys per sector
(recommended)
Security Level 2
MIFARE Plus® – Simplified Security Concept
• Mandatory AES
authentication
• Still using Crypto1 on
memory blocks
June 22, 2016
38. 40
Memory Structure – Linear Memory
16
bytes
Secto
r0
Secto
r1
……
…….
Block 0
Block 1
Block 2
Block
3
Block 0
Block 1
Block 2
Access Conditions Key
B
Key
A
Sector 0, Block 0 contains (N)UID
& production specific data
• for customer data
• for values (enables value
operations)
Sector
Trailer
MIFARE Plus
48-bit Crypto1 or
128-bit AES
MIFARE Classic
48-bit Crypto1
June 22, 2016
39. 41
Advantages Compared to Other
Security Products
State-of-the-art 128 bit AES security
Clone & fraud protection
ISO 14443-4 compatible
NFC capable
Pricing at the level of MIFARE Classic®
InSecurityLevel3
41. 43
MIFARE Plus® generation benefits
MIFARE Plus® SE
Entry level version of the proven
MIFARE Plus product family
Get AES security in existing MIFARE
Classic cards budgets
Be protected from clones
Upgrade smoothly within the
MIFARE product family
Implement NFC capabilities in
highest security level
Features:
• 1K EEPROM only
• Based on MIFARE Plus S
• Including MIFARE Classic
value block commands
1994
MIFARE
Classic
2008
MIFARE Plus
06/2015
MIFARE Plus SE
04/2016
MIFARE Plus EV1
June 22, 2016
42. 44
securing legacy systems – guaranteeing lowest cost of ownership
MIFARE PLUS SE – Key Features
Smooth migration not interfering
with end user experience
Security level concept &
backwards compitablilty
Use existing memory
organization and access rights –
1:1 mapping to new MIFARE Plus
SE
MIFARE Classic 1K memory
organization
Card top-up via mobile phone /
no need for additional
infrastructure
State-of-the-art 128-bit AES
encryption
Minimizing migration
efforts
Seamless migration
process
Enable new value
streams & services
June 22, 2016
43. 45
MIFARE Plus® generation benefits
MIFARE Plus® EV1
Operate legacy- next to bench-mark
AES-secure infrastructure
Enhanced mobile support with ISO-
7816 wrapping
Secure transactions even for legacy
Crypto1 applications
Enhanced service support with end
to end secure channel
communication
Common Criteria EAL5+ targeted
Features:
• Sector-wise security level
switching
• ISO 7816 wrapping – full
mobile support
• 2K or 4K EEPROM
available
1994
MIFARE
Classic
2008
MIFARE Plus
06/2015
MIFARE Plus SE
04/2016
MIFARE Plus EV1
June 22, 2016
44. 46
allows for selective system security upgrades and enables new, over-the-air value stream possibilities
MIFARE PLUS EV1 – Key Features
Card top-up via mobile phone /
no need for additional
infrastructure
Secure end2end channel
communication even for legacy
crypto
Upgrade security relevant
applications only instead of
whole system
Sector-wise security upgrade
from Crypto1 to 128-bit AES
Enable combined service
offerings for end-users incl.
mobile offerings
Transaction MAC ensuring that
no fraudulent claims can be
made by merchants
Minimize total cost of
ownership for end
customer system
Enable new value
streams & services
Secure convergence of
multiple 3rd party
applications
June 22, 2016
46. • Flexible application and file system
• Each application is alike a folder
under a Windows root directory
• Applications and files are defined
during its creation
• Each individual application
manages its own keys
• Access rights defined per file
MIFARE DESFire Product Family
Secure Multi-application Platform
48
Root directory
PICC Level
Files
5 standard file types
Keys
Application specific keys
Keys
Card Specific keys
Application
Application ID
June 22, 2016
47. • High-end platform for secure multi-application
• Seamless integration into other form factors, e.g.
NFC devices or banking cards
• Offering flexible, high level security features
• DES/3DES/AES authentication
• MAC Protection
• Full enciphered communication
• Common Criteria certification up to EAL 5+
• Compliance with industry standards
• ISO 14443-4 A compliant
• Compatible with ISO 7816
MIFARE DESFire Product Family
Features and benefits
49 June 22, 2016
48. 2002
MIFARE DESFire
2008
MIFARE DESFire EV1
2015
MIFARE DESFire EV1 256B
2016
MIFARE DESFire EV2
Evolution to MIFARE® DESFire® EV2 MIFARE
DESFire EV1
MIFARE
DESFire EV2
ISO/IEC 14443 A 1-4
ISO/IEC 7816-4 support extended extended
EEPROM data memory 2/4/8KB 2/4/8KB
Flexible file structure
NFC Forum Tag Type 4
Secure, high-speed cmd
Unique ID 7BUID or 4B RID 7BUID or 4B RID
Number of applications 28 unlimited
Number of files per app 32 32
High data rates support up to 848 Kbit/s up to 848 Kbit/s
Crypto algorithms support
DES/2K3DES/
3K3DES/AES
DES/2K3DES/
3K3DES/AES
CC certification (HW + SW) EAL 4+ EAL 5+
MIsmartApp feature -
Transaction MAC per app -
Multiple keysets per app - Up to 16 keysets
Multiple file access rights - Up to 8 keys
Inter-app files sharing -
Virtual Card Architecture -
Proximity Check -
Delivery types
Wafer, MOA4 &
MOA8
Wafer, MOA4 &
MOB6
49. • Limited memory of typ. 256Bytes for
one application configuration
• Ideal for applications with low memory
but high security needs
• Based on MIFARE DESFire EV1
• Fully interoperable with existing
MIFARE DESFire infrastructure
MIFARE DESFire EV1 256B
Features and compatibility
51. June 22, 2016
51. Functional backward compatible to DESFire EV1 – Drop-In Replacement
MIsmartApp supporting post-issuance applications – Multi-Application
Secure inter-applications files sharing – Inter-Applications Transaction
PerformanceSecurity
Multi
Application
Multiple rolling keysets per application – Update Keys in the Field
Transaction MAC – Proof of Transaction
State-of-the-art HW & SW security design – Security Assurance
Optimum transaction speed vs security – Fast & Secure
Improved RF performance – More Operating Range
Improved transaction tearing handling – Reliable Transactions
MIFARE® DESFire® EV2 Key Innovative Features
53. June 22, 2016
52. MIFARE Mobile Solution
MIFARE4Mobile
• MIFARE emulation in mobile devices
• Available for MIFARE Classic, MIFARE Plus and MIFARE
DESFire
• Secure implementation
• Seamless integration into existing infrastructure
MIFARE SDK
• Integrate c´less smart cards into mobile app
• Make your application mobile today - Develop your NFC app
within 10 minutes!
• Available for Android supporting all MIFARE products
54. June 22, 2016
53. OVERCOMES THE
COMPLEXITY OF
HANDLING BITS AND
BYTES
READ AND WRITE
ON NXP ICs ON A
JAVA LEVEL
FIRST API TO DEVELOP
NFC ANDROID APPS
EASY LIBRARY
INTEGRATION IN
ANDROID STUDIO
COMPATIBLE WITH
MIFARE, ICODE &
NTAG PRODUCTS
54. • DESFire.authenticate ();
• DESFire.readData ();
• DESFire.readNDEF ();
• DESFire.writeData ()
• ...
Java documentation is
available at MIFARE.net
COMPLEXITY
Decreasing development time by using Java commands instead
of using bits and bytes or hexa-decimals.
June 22, 201656.
55. REFERENCES EVENT AND MICROPAYMENT SOLUTIONS
• Attendance check & consumer engagement at events
and payment solutions
• Product: MIFARE Ultralight
• Located in Spain
HUMANITARIAN SOLUTIONS
• Multi-wallet solution for organizing money/vouchers
to save them on the card
• Product: MIFARE DESFire Ev1
• Located in UK as well as Turkey
NFC GAMING SOLUTIONS
• NFC based mobile gaming
• One solution: by tapping a plastic chip, dinosaurs
become real in an Android app and fight
• Product: NTAG 210
• Located in US
NXP TagInfo
NXP TagWriter
56. OTENTICO – BRAND PROTECTION
• Mobile product authentication and brand
protection for a variety of products
• Current use-case with Adidas
• Product: depends on the use-case
• Located in London, UK
One use-case of OTENTICO with Fyshe
• Product authentication for racing suits to comply with
racing requirements and to ensure drivers safety
• Driver details are saved on the tags such as Name,
Race, Fotos, Track-history, etc.
• If the suit will be sold for charity it also ensures its
originality and buyers can track the drivers history
EMPLOYEE IDENTIFICATION
• Employees tap a phone and guarantee their presence
• Times are saved in the cloud and can be checked from
employees and HR
• Chinese Telecom also offers the solution to business clients and
set it up for them at their location
• Product: NTAG 213
• Located in China
NXP TagInfo
NXP TagWriter
REFERENCES
57. MIFARE Product Selection Guide
Cost sensitive
solutions
Migration solutions
Secure, Multi-
application solutions
Mobile and
convergence
Corporate
MIFARE Plus SE
DESFire 256B
MIFARE Plus EV1 DESFire 2k/4k/8k
MIFARE4Mobile
SmartMX with MIFARE
Impl.
Hospitality
Ultralight C/EV1
DESFire 256B
MIFARE Plus EV1 DESFire 2k/4k/8k
Campus
MIFARE Plus SE
DESFire 256B
MIFARE Plus EV1 DESFire 2k/4k/8k
Leisure
Ultralight C/EV1
DESFire 256B
ICODE DNA
MIFARE Plus EV1 DESFire 2k/4k/8k
Residential
MIFARE Plus SE
DESFire 256B
- DESFire 2k/4k/8k
June 22, 201659.
58. Thank you
Visit us at http://MIFARE.net
Follow us:
https://twitter.com/nxp_mifare https://at.linkedin.com/in/nxpmifarewww.youtube.com/user/nxpsemiconductorshttp://blog.nxp.com/ https://www.facebook.com/nxpsemi
60. Webinar Series
Outlook
Date Title
May 24th 2016 MIFARE Innovation Roadmap – present improved, future inside
June 1st 2016 How to protect contactless systems today and tomorrow
June 8th 2016 Enhanced user experience through active application management
June 15th 2016 Streamlined user management for multi-vendor installations
June 22nd 2016 Secure closed loop payments in an open environment
June 29th 2016 Introduce the future in your today’s system – how to ensure smooth system upgrades
July 6th 2016 Added value to card based environments through NFC and cloud – when IoT
becomes reality
July 13th 2016 Complement use cases with mobiles and wearables
61. MIFARE IC family overview
Product Features
MIFARE Ultralight MIFARE Classic MIFARE Plus MIFARE DESFire
Nano EV1 C EV1 S SE X EV1 EV1 EV2
RF Interface ISO/IEC14443-2, Type A
Protocol ISO/IEC14443-3 ISO/IEC14443-3&4 ISO/IEC14443-4
UID – uniqueidentifier 7-byte UID 7-byte UID, 4-byte NUID, Random ID 7-byte UID, Random ID
Communication speed 106 Kbps 106-848 Kbps
Memory size [Bytes] 40 48 128 144 1K 4K 2K 4K 1K 2K 4K 2K 4K 256 2K 4K 8K 2K 4K 8K
Memory Model Compact, 4-byte page Compact, Sectors & 16-byte block Flexiblefile system
Crypto TDES Crypto-1 Crypto-1, AES DES / 2K3DES / 3K3DES / AES
Key Length 112-bit 48-bit Crypto-1 48-bit Crypto-1, 128-bit AES 128-bit AES, up to 168-bit DES
Authentication key / password Password 3-pass mutual
Communication-Security - Encrypted Plain, CMACed, Encrypted w. CMAC Plain, CMACed, Encrypted w. CMAC
MIsmartApp - - ✔
TransactionMAC - - ✔ - ✔
Multi Key Sets - - ✔
Proximity Check - ✔ - ✔
Virtual Card Select - ✔ - ✔
Originality check features
ECC signature
re-programmable
ECC signature ECC signature AES originalitykeys
AES originalitykeys,
ECC signature
AES originalitykeys, ECC signature
CC Certification - EAL4+ - EAL4+ EAL5+ EAL4+ EAL5+
ISO 7816-4 APDU - ✔ ✔
NFC compliance
NFC Forum
Tag Type 2 compliant
No- supported by
majority of NFC devices
NFC capable in SL 3
NFC capabilities
in SL1 and SL 3
NFC Forum Tag Type 4
V2.0 compliant
Target applications
Public Transport & Event Ticketing
Loyalty Programs, limiteduse tickets
Various applications –
recommended to move
to higher security ICs
Public transport / Campus cards /
Access management
Smart City Platform / Advanced Mobility Multi-applications /
Micropayment/ Loyalty Programs / Access Management
Input capacitance 17pF or 50pF 17pF or 50pF 17pF 17pF or 70pF 17pF or 70pF
Multi applications - supported via MAD supported via MAD dynamic
Delivery Types – 7 Byte UID
Wafer 120µm / 17 pF
MF0UN0001
DUD
MF0UL1101
DUD
MF0UL2101
DUD
MF0ICU2001
DUD
MF1S5001X
DUD1)
MF1S7001
XDUD1)
MF1SPLUS6001
DUD1)
MF1SPLUS8001
DUD1)
MF1SEP1001
DUD1)
MF1PLUS6001
DUD1)
MF1PLUS8001
DUD1)
MF1P2101
DUD1)
MF1P4101
DUD1)
MF3ICDQ101
DUD
MF3ICD2101
DUD
MF3ICD4101
DUD
MF3ICD8101
DUD
MF3D2201
DUD
MF3D4201
DUD
MF3D8201
DUD
Wafer 120 µm / High Cap
MF0UN0001
DUF
MF0ULH1101
DUD
MF0ULH2101
DUD
MF0ICU2101
DUD
- - - - - - -
MF1PH2101
DUD1)
MF1PH4101
DUD1)
MF3ICDHQ101
DUD
MF3ICDH2101
DUD
MF3ICDH4101
DUD
MF3ICDH8101
DUD
MF3DH2201
DUD
MF3DH4201
DUD
MF3DH8201
DUD
Wafer 75 µm / 17pF
MF0UNH0001
DUD
MF0UL1101
DUF
MF0UL2101
DUF
-
MF1S5001X
DUF1)
MF1S7001
XDUF1)
- - - - -
MF1P2101
DUF1)
MF1P4101
DUF1)
MF3ICDQ101
DUF
MF3ICD2101
DUF
MF3ICD4101
DUF
MF3ICD8101
DUF
MF3D2201
DUF
MF3D4201
DUF
MF3D8201
DUF
Wafer 75 µm / High Cap
MF0UNH0001
DUF
MF0ULH1101
DUF
MF0ULH2101
DUF
- - - - - - - -
MF1PH2101
DUF1)
MF1PH4101
DUF1)
MF3ICDHQ101
DUF
MF3ICDH2101
DUF
MF3ICDH4101
DUF
MF3ICDH8101
DUF
MF3DH2201
DUF
MF3DH4201
DUF
MF3DH8201
DUF
MOA4 / 17pF - - -
MF0MOU2001
DA4
- -
MF1SPLUS6001
DA41)
MF1SPLUS8001
DA41)
MF1SEP1001
DA41)
MF1PLUS6001
DA41)
MF1PLUS8001
DA41)
MF1P2100
DA41)
MF1P4100
DA41) -
MF3MOD2101
DA4
MF3MOD4101
DA4
MF3MOD8101
DA4
MF3D2200
DA4
MF3D4200
DA4
MF3D8200
DA4
MOA4 / High Cap - -
MF0MOU2101
DA4
MF1S5000
XDA41)
MF1S7000
XDA41) - - - - -
MF1PH2100
DA41)
MF1PH4100
DA41) -
MF3MODH210
1DA4
MF3MODH4101
DA4
MF3MODH810
1DA4
MF3DH2200
DA4
MF3DH4200
DA4
MF3DH8200
DA4
MOA8 / 17 pF -
MF0UL2101
DA8
MF0MOU2001
DA8
- -
MF1SPLUS6001
DA81)
MF1SPLUS8001
DA81)
MF1SEP1001
DA81)
MF1PLUS6001
DA81)
MF1PLUS8001
DA81) - -
MF3MODQ101
DA8
MF3MOD2101
DA8
MF3MOD4101
DA8
MF3MOD8101
DA8
- - -
MOA8 / High Cap - - -
MF1S5000
XDA81)
MF1S7000
XDA81)
- - - - - - -
MF3MODHQ101
DA8
MF3MODH210
1DA8
MF3MODH4101
DA8
MF3MODH810
1DA8
- - -
MOB6 / 17pF - - - - - - - - - -
MF1P2100
DA61)
MF1P4100
DA61) - - - -
MF3D2200
DA6
MF3D4200
DA6
MF3D8200
DA6
MOB6 / High Cap - - - - - - - - - -
MF1PH2100
DA61)
MF1PH4100
DA61) - - - -
MF3DH2200
DA6
MF3DH4200
DA6
MF3DH8200
DA6
1) available also in legacy 4 Byte NUID