SlideShare a Scribd company logo
EXTERNAL USE
IHAR BAYARENKA
BD DIRECTOR
RUSSIA / CIS
19 MAY 2016
SECURE IDENTIFICATION 2016
RIGA, LATVIA
NEXT SECURE IDENTITIES:
SECURE UHF TAGS
FIDO U2F TOKENS
EXTERNAL USE1
Agenda
• Introducing NXP
• Mainstream Secure Identity applications
• Emerging applications
− Automotive Vehicle Identification
− FIDO online authentication
EXTERNAL USE2
INTRODUCING NXP
>$10B
IN ANNUAL
REVENUE
11,000+
ENGINEERS
~45,000
EMPLOYEES
9,000+
PATENT
FAMILIES
35+
COUNTRIES
4th Largest
SEMICONDUCTOR
COMPANY
GLOBALLY1
Note:
1. All financial figures are based on trailing twelve month reported information; R&D expense are non-GAAP
SECURE IDENTIFICATION
AUTOMOTIVE
RF POWER
TRANSISTORS
MARKET LEADER IN...
SMALL SIGNAL
DISCRETES
BROAD-BASED MCUs1COMMUNICATIONS
PROCESSORS
EXTERNAL USE3
HOW YOU ENCOUNTER NXP IN YOUR DAILY LIFE
 Payment cards
 Mobile phones
 Public transport tickets
 Access cards
 Electronic ID documents
 Membership & loyalty cards
 Car entertainment
EXTERNAL USE4
SECURE ID – MARKET VIEW – TRENDS
MARKET GROWTH IS MAINLY DRIVEN BY NATIONAL ID
SECURITY
LEADING TRENDS
• Digitization of documents and online services
• Convergence of applications
• Derived IDs on mobile phones0
100
200
300
400
500
600
700
800
900
2013 2014 2015 2016 2017 2018 2019 2020
SMART CARD SHIPMENTS BY APPLICATION WORLDWIDE
Passport National ID Healthcare Other

!
FRAUD ONLINE SERVICES
KEY DRIVERS
Source: ABI Research, Q1 2016
EXTERNAL USE5
MARKET POSITION
49,0%
31,8%
11,2%
6,2%
1,7%
Secure IC Vendor Market Share FY 2014*
#1 provider of e-Government secure IC
solutions
83% (120+ out of 145+) countries that
introduced eGovernment solutions use NXP
250+ out of 400+ projects worldwide are
based on NXP´s Secure ICs
*Source: ABI 2015
EXTERNAL USE6
AUTOMATIC
VEHICLE
IDENTIFICATION (AVI)
EXTERNAL USE7
Evolution of tolling systems
Once upon a time, there was “stop, pay, then go”…
EXTERNAL USE8
…then came optical systems (image recognition)…
EXTERNAL USE9
…then came active RFID systems…
EXTERNAL USE10
…then came passive RFID…
EXTERNAL USE11
…and today we have secure passive RFID!
not to scale
For maximum protection and best read reliability, use of license plates in combination with
windshield stickers is recommended.
EXTERNAL USE12
Secure passive RFID enables effective road tolling…
EXTERNAL USE13
Secure passive RFID takes you well beyond tolling…
EXTERNAL USE14
Secure passive RFID takes you well beyond tolling…
EXTERNAL USE15
Secure passive RFID takes you well beyond tolling…
EXTERNAL USE16
Secure passive RFID takes you well beyond tolling…
EXTERNAL USE17
It turns your vehicle into ID document, payment or loyalty card
eID
EXTERNAL USE18
NXP solutions for AVI applications
Passive UHF tag IC
with cryptographic authentication
world-leading
long range
contactless performance
cutting-edge
security implementation
for tag authentication
All based on international standards
* GS1 (EPCglobal™ Inc.) UHF RFID Generation-2 Version 2.0
** ISO/IEC 29167-10 for proof of origin based on AES (Advanced Encryption Standard)
EXTERNAL USE19
FIDO U2F TOKENS
FOR ONLINE
AUTHENTICATION
EXTERNAL USE20
Issues with online authentication
• Passwords
− bad passwords, key logging, guessing, phishing
• SW based solutions
− Cookie, certificates, OTP applications
• HW based solutions
One-Time-Password Smart Card / PKI USB Key
• Security (MITM)
• User experience
• Phishable
• Interoperability
• Middleware
• PIN required
• No privacy
EXTERNAL USE21
Mission of the FIDO Alliance is to change the nature of online authentication by developing technical specifications that define an open, scalable, interoperable
set of mechanisms that reduce the reliance on passwords to authenticate users, support adaption, standardize specifications.
INTERNET SERVICES SOFTWARE & STACKSCOMPONENT & DEVICE VENDORS
About the FIDO Alliance
EXTERNAL USE22
FIDO Value Proposition
Easy to deploy:
BYOD self registration model
(no issuance), no PKI, no middleware
required
Interoperability:
Open specification
(client and server)
Security:
Public key cryptography, no phishing,
no MITM, vendor verification,
tamper resistant by SE
Privacy:
Site specific keys
No unique ID per device
MITM: Man-in-the-middle/browserBYOD: Bring your own device SE: Secure Element PKI: Public Key Infrastructure
EXTERNAL USE23
UAF
U2F
FIDO is promoting two authentication protocols
EXTERNAL USE24
UAF U2F
Both specs have seen large scale adoption
EXTERNAL USE25
Government participation in FIDO Alliance
Increasing government participation in FIDO Alliance
Since adoption/deployment of full PKI solution is slow,
new topics like FIDO or derived identity are getting
traction
• Use cases
− Elster USB key
− FIDO enabled PIV card
• Recent news (April 2016)
GOV.UK Verify service becomes the first government
service in the world to support a FIDO U2F authenticator
based on open standards
EXTERNAL USE26
USB
In combination with USB
• 2-chip solution allows flexible MCU selection
• MCU allows flexible driver support (HID, CCID,…) and
write protection to prevent USB firmware attacks
• MCU may support wide range of peripherals (storage,
display, battery, PIN pad,…)
Secure Element Solutions for FIDO U2F
Maximum security and flexibility for any interface combination
In combination with NFC
• SE fully integrated with ISO14443
interface
In combination with BLE
• Many SE interfaces available (UART,
I2C, SPI) Secure
Element
EXTERNAL USE27
USB Ref DesignIC solutions
NXP solutions for FIDO U2F tokens
Single IF or DIF SEs
Multiple Interfaces
• Smart card ISO7816, 14443
• Wired I2C and/or SPI
Java OS + FIDO U2F
applet
USB Controller with
multiple GPIOs
• LCD, LED
• PIN-pad, Button
• Flash storage
Single IF or DIF SEs
Multiple Interfaces
• USB only
• USB+NFC
• BLE only
• BLE+NFC
Ready for mass
production
Gerber files + BOM
FIDO Approved
NXP presentation at Secure Identifications 2016

More Related Content

What's hot

NFC: Connect, Transact, and Charge
NFC: Connect, Transact, and ChargeNFC: Connect, Transact, and Charge
NFC: Connect, Transact, and Charge
NFC Forum
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)
Bharat Kachhwaha
 
RFID Journal Live! 2019
RFID Journal Live! 2019RFID Journal Live! 2019
RFID Journal Live! 2019
NFC Forum
 
Mobile Payment - Will NFC finally unlock a new value chain?
Mobile Payment - Will NFC finally unlock a new value chain?Mobile Payment - Will NFC finally unlock a new value chain?
Mobile Payment - Will NFC finally unlock a new value chain?
Martin Gutberlet
 
RFID2015_NFC-WISP_public(delete Disney research)
RFID2015_NFC-WISP_public(delete Disney research)RFID2015_NFC-WISP_public(delete Disney research)
RFID2015_NFC-WISP_public(delete Disney research)Yi (Eve) Zhao
 
State of the Market
State of the MarketState of the Market
State of the Market
NFC Forum
 
Embedded systems security news 2011/04
Embedded systems security news 2011/04Embedded systems security news 2011/04
Embedded systems security news 2011/04AurMiana
 
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
NFC Forum
 
IoT for Smarter Health Care
IoT for Smarter Health CareIoT for Smarter Health Care
IoT for Smarter Health Care
Dr. Wilfred Lin (Ph.D.)
 
6 20 2017 visionfc transport - public
6 20 2017   visionfc transport  - public6 20 2017   visionfc transport  - public
6 20 2017 visionfc transport - public
NFC Forum
 
Nfc
NfcNfc
Connections Summit
Connections SummitConnections Summit
Connections Summit
NFC Forum
 
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
NFC Forum
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
Seminar Links
 
VISIONFC Automotive Summit
VISIONFC Automotive SummitVISIONFC Automotive Summit
VISIONFC Automotive Summit
NFC Forum
 
Architecture and Development of NFC Applications
Architecture and Development of NFC ApplicationsArchitecture and Development of NFC Applications
Architecture and Development of NFC Applications
Thomas de Lazzari
 
Build your IoT project with Libelium devices: from sensors to the cloud (Libe...
Build your IoT project with Libelium devices: from sensors to the cloud (Libe...Build your IoT project with Libelium devices: from sensors to the cloud (Libe...
Build your IoT project with Libelium devices: from sensors to the cloud (Libe...
AGILE IoT
 
NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021
Antenna Manufacturer Coco
 
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Team
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC Forum
 

What's hot (20)

NFC: Connect, Transact, and Charge
NFC: Connect, Transact, and ChargeNFC: Connect, Transact, and Charge
NFC: Connect, Transact, and Charge
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)
 
RFID Journal Live! 2019
RFID Journal Live! 2019RFID Journal Live! 2019
RFID Journal Live! 2019
 
Mobile Payment - Will NFC finally unlock a new value chain?
Mobile Payment - Will NFC finally unlock a new value chain?Mobile Payment - Will NFC finally unlock a new value chain?
Mobile Payment - Will NFC finally unlock a new value chain?
 
RFID2015_NFC-WISP_public(delete Disney research)
RFID2015_NFC-WISP_public(delete Disney research)RFID2015_NFC-WISP_public(delete Disney research)
RFID2015_NFC-WISP_public(delete Disney research)
 
State of the Market
State of the MarketState of the Market
State of the Market
 
Embedded systems security news 2011/04
Embedded systems security news 2011/04Embedded systems security news 2011/04
Embedded systems security news 2011/04
 
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
 
IoT for Smarter Health Care
IoT for Smarter Health CareIoT for Smarter Health Care
IoT for Smarter Health Care
 
6 20 2017 visionfc transport - public
6 20 2017   visionfc transport  - public6 20 2017   visionfc transport  - public
6 20 2017 visionfc transport - public
 
Nfc
NfcNfc
Nfc
 
Connections Summit
Connections SummitConnections Summit
Connections Summit
 
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
VISIONFC Automotive Summit
VISIONFC Automotive SummitVISIONFC Automotive Summit
VISIONFC Automotive Summit
 
Architecture and Development of NFC Applications
Architecture and Development of NFC ApplicationsArchitecture and Development of NFC Applications
Architecture and Development of NFC Applications
 
Build your IoT project with Libelium devices: from sensors to the cloud (Libe...
Build your IoT project with Libelium devices: from sensors to the cloud (Libe...Build your IoT project with Libelium devices: from sensors to the cloud (Libe...
Build your IoT project with Libelium devices: from sensors to the cloud (Libe...
 
NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021
 
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and Far
 

Viewers also liked

NXP Company Presentation
NXP Company PresentationNXP Company Presentation
NXP Company Presentationchileungchan
 
NXP presentation at PLUS-Forum 2016
NXP presentation at PLUS-Forum 2016NXP presentation at PLUS-Forum 2016
NXP presentation at PLUS-Forum 2016
Ihar Bayarenka
 
NXP-Freescale Merger Investor Presentation
NXP-Freescale Merger Investor PresentationNXP-Freescale Merger Investor Presentation
NXP-Freescale Merger Investor Presentation
Gary Lerude
 
Applying semantic web technologies at NXP Semiconductors
Applying semantic web technologies at NXP SemiconductorsApplying semantic web technologies at NXP Semiconductors
Applying semantic web technologies at NXP Semiconductors
Parvathy Meenakshy
 
Nxp company presentation
Nxp company presentationNxp company presentation
Nxp company presentationAnouk_Bos
 
The Advantages of NXP ARM based microcontrollers
The Advantages of NXP ARM based microcontrollersThe Advantages of NXP ARM based microcontrollers
The Advantages of NXP ARM based microcontrollers
Daniel O'Hara
 
The future of mobile learning in the workplace: Qualcomm Insights
The future of mobile learning in the workplace: Qualcomm InsightsThe future of mobile learning in the workplace: Qualcomm Insights
The future of mobile learning in the workplace: Qualcomm Insights
geoff stead
 
Präsentation
PräsentationPräsentation
Präsentation
Sarah Hinterreiter
 
Techniques and Challenges in Designing Wideband Power Amplifiers Using GaN an...
Techniques and Challenges in Designing Wideband Power Amplifiers Using GaN an...Techniques and Challenges in Designing Wideband Power Amplifiers Using GaN an...
Techniques and Challenges in Designing Wideband Power Amplifiers Using GaN an...
Lisa Bradley
 
Embedded Security in ARM-based microcontrollers
Embedded Security in ARM-based microcontrollersEmbedded Security in ARM-based microcontrollers
Embedded Security in ARM-based microcontrollers
team-WIBU
 
1 mosfet 1 basics
1 mosfet 1 basics1 mosfet 1 basics
1 mosfet 1 basics
Sandeep Yandamuri
 
1 Day Arm 2007
1 Day Arm 20071 Day Arm 2007
1 Day Arm 2007
guestecd958
 
Trusted Platform Module (TPM)
Trusted Platform Module (TPM)Trusted Platform Module (TPM)
Trusted Platform Module (TPM)
k33a
 
rectifiers
rectifiersrectifiers
rectifiers
Saurabh Rana
 
Power electronics note
Power electronics notePower electronics note
Power electronics noteravalgautu
 
Presentation on half and full wave ractifier.ppt
Presentation on half and full wave ractifier.pptPresentation on half and full wave ractifier.ppt
Presentation on half and full wave ractifier.ppt
Kawsar Ahmed
 
NFC And HCE 2016 - What’s Next?
NFC And HCE 2016 - What’s Next?NFC And HCE 2016 - What’s Next?
NFC And HCE 2016 - What’s Next?
NFC Forum
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tags
Ihar Bayarenka
 
Metal Oxide Semiconductor Fet (Mosfet)
Metal Oxide Semiconductor Fet (Mosfet)Metal Oxide Semiconductor Fet (Mosfet)
Metal Oxide Semiconductor Fet (Mosfet)stooty s
 

Viewers also liked (20)

NXP Company Presentation
NXP Company PresentationNXP Company Presentation
NXP Company Presentation
 
NXP presentation at PLUS-Forum 2016
NXP presentation at PLUS-Forum 2016NXP presentation at PLUS-Forum 2016
NXP presentation at PLUS-Forum 2016
 
NXP-Freescale Merger Investor Presentation
NXP-Freescale Merger Investor PresentationNXP-Freescale Merger Investor Presentation
NXP-Freescale Merger Investor Presentation
 
Applying semantic web technologies at NXP Semiconductors
Applying semantic web technologies at NXP SemiconductorsApplying semantic web technologies at NXP Semiconductors
Applying semantic web technologies at NXP Semiconductors
 
Nxp company presentation
Nxp company presentationNxp company presentation
Nxp company presentation
 
The Advantages of NXP ARM based microcontrollers
The Advantages of NXP ARM based microcontrollersThe Advantages of NXP ARM based microcontrollers
The Advantages of NXP ARM based microcontrollers
 
Values NXP
Values NXPValues NXP
Values NXP
 
The future of mobile learning in the workplace: Qualcomm Insights
The future of mobile learning in the workplace: Qualcomm InsightsThe future of mobile learning in the workplace: Qualcomm Insights
The future of mobile learning in the workplace: Qualcomm Insights
 
Präsentation
PräsentationPräsentation
Präsentation
 
Techniques and Challenges in Designing Wideband Power Amplifiers Using GaN an...
Techniques and Challenges in Designing Wideband Power Amplifiers Using GaN an...Techniques and Challenges in Designing Wideband Power Amplifiers Using GaN an...
Techniques and Challenges in Designing Wideband Power Amplifiers Using GaN an...
 
Embedded Security in ARM-based microcontrollers
Embedded Security in ARM-based microcontrollersEmbedded Security in ARM-based microcontrollers
Embedded Security in ARM-based microcontrollers
 
1 mosfet 1 basics
1 mosfet 1 basics1 mosfet 1 basics
1 mosfet 1 basics
 
1 Day Arm 2007
1 Day Arm 20071 Day Arm 2007
1 Day Arm 2007
 
Trusted Platform Module (TPM)
Trusted Platform Module (TPM)Trusted Platform Module (TPM)
Trusted Platform Module (TPM)
 
rectifiers
rectifiersrectifiers
rectifiers
 
Power electronics note
Power electronics notePower electronics note
Power electronics note
 
Presentation on half and full wave ractifier.ppt
Presentation on half and full wave ractifier.pptPresentation on half and full wave ractifier.ppt
Presentation on half and full wave ractifier.ppt
 
NFC And HCE 2016 - What’s Next?
NFC And HCE 2016 - What’s Next?NFC And HCE 2016 - What’s Next?
NFC And HCE 2016 - What’s Next?
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tags
 
Metal Oxide Semiconductor Fet (Mosfet)
Metal Oxide Semiconductor Fet (Mosfet)Metal Oxide Semiconductor Fet (Mosfet)
Metal Oxide Semiconductor Fet (Mosfet)
 

Similar to NXP presentation at Secure Identifications 2016

RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula HunterRFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
NFC Forum
 
NFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer ExperienceNFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer Experience
NFC Forum
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Identity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authenticationIdentity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authentication
Leonard Moustacchis
 
FREYR UDI VISION SERIES SESSION 2 - BARCODING & LABELING
FREYR UDI VISION SERIES SESSION 2 - BARCODING & LABELINGFREYR UDI VISION SERIES SESSION 2 - BARCODING & LABELING
FREYR UDI VISION SERIES SESSION 2 - BARCODING & LABELING
Freyr Solutions
 
Parking Lot Security System using RFID Technology
Parking Lot Security System using RFID TechnologyParking Lot Security System using RFID Technology
Parking Lot Security System using RFID Technology
ijtsrd
 
E-Catalogue Of HUAYUAN RFID Products
E-Catalogue Of HUAYUAN RFID ProductsE-Catalogue Of HUAYUAN RFID Products
E-Catalogue Of HUAYUAN RFID ProductsHUAYUAN ELECTRONIC
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
IRJET Journal
 
Tap into NFC Meetup - Boston
Tap into NFC Meetup  - Boston Tap into NFC Meetup  - Boston
Tap into NFC Meetup - Boston
NFC Forum
 
2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido Alliance2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido Alliance
COMPUTEX TAIPEI
 
Beyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at ScaleBeyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at Scale
NFC Forum
 
Civintec introduction 2015
Civintec introduction 2015Civintec introduction 2015
Civintec introduction 2015
CIVINTEC GLOBAL CO.,LTD
 
arh-passport-readers-catalogue.pdf
arh-passport-readers-catalogue.pdfarh-passport-readers-catalogue.pdf
arh-passport-readers-catalogue.pdf
Michael993266
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
FIDO Alliance
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
FIDO Alliance
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologies
skumartarget
 
Catalogue european countries may 2019_compressed
Catalogue european countries may 2019_compressedCatalogue european countries may 2019_compressed
Catalogue european countries may 2019_compressed
Mauricio Conus
 
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong AuthenticationFIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO Alliance
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 

Similar to NXP presentation at Secure Identifications 2016 (20)

RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula HunterRFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
RFID Journal Live 2018 - "IoT 2021: Connectivity on Your Terms", Paula Hunter
 
NFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer ExperienceNFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer Experience
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Identity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authenticationIdentity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authentication
 
FREYR UDI VISION SERIES SESSION 2 - BARCODING & LABELING
FREYR UDI VISION SERIES SESSION 2 - BARCODING & LABELINGFREYR UDI VISION SERIES SESSION 2 - BARCODING & LABELING
FREYR UDI VISION SERIES SESSION 2 - BARCODING & LABELING
 
Parking Lot Security System using RFID Technology
Parking Lot Security System using RFID TechnologyParking Lot Security System using RFID Technology
Parking Lot Security System using RFID Technology
 
E-Catalogue Of HUAYUAN RFID Products
E-Catalogue Of HUAYUAN RFID ProductsE-Catalogue Of HUAYUAN RFID Products
E-Catalogue Of HUAYUAN RFID Products
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
 
Tap into NFC Meetup - Boston
Tap into NFC Meetup  - Boston Tap into NFC Meetup  - Boston
Tap into NFC Meetup - Boston
 
2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido Alliance2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido Alliance
 
Beyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at ScaleBeyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at Scale
 
Civintec introduction 2015
Civintec introduction 2015Civintec introduction 2015
Civintec introduction 2015
 
arh-passport-readers-catalogue.pdf
arh-passport-readers-catalogue.pdfarh-passport-readers-catalogue.pdf
arh-passport-readers-catalogue.pdf
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologies
 
Catalogue european countries may 2019_compressed
Catalogue european countries may 2019_compressedCatalogue european countries may 2019_compressed
Catalogue european countries may 2019_compressed
 
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong AuthenticationFIDO's Role in the Global Regulatory Landscape for Strong Authentication
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
 
Anviz8 page FINAL
Anviz8 page FINALAnviz8 page FINAL
Anviz8 page FINAL
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

NXP presentation at Secure Identifications 2016

  • 1. EXTERNAL USE IHAR BAYARENKA BD DIRECTOR RUSSIA / CIS 19 MAY 2016 SECURE IDENTIFICATION 2016 RIGA, LATVIA NEXT SECURE IDENTITIES: SECURE UHF TAGS FIDO U2F TOKENS
  • 2. EXTERNAL USE1 Agenda • Introducing NXP • Mainstream Secure Identity applications • Emerging applications − Automotive Vehicle Identification − FIDO online authentication
  • 3. EXTERNAL USE2 INTRODUCING NXP >$10B IN ANNUAL REVENUE 11,000+ ENGINEERS ~45,000 EMPLOYEES 9,000+ PATENT FAMILIES 35+ COUNTRIES 4th Largest SEMICONDUCTOR COMPANY GLOBALLY1 Note: 1. All financial figures are based on trailing twelve month reported information; R&D expense are non-GAAP SECURE IDENTIFICATION AUTOMOTIVE RF POWER TRANSISTORS MARKET LEADER IN... SMALL SIGNAL DISCRETES BROAD-BASED MCUs1COMMUNICATIONS PROCESSORS
  • 4. EXTERNAL USE3 HOW YOU ENCOUNTER NXP IN YOUR DAILY LIFE  Payment cards  Mobile phones  Public transport tickets  Access cards  Electronic ID documents  Membership & loyalty cards  Car entertainment
  • 5. EXTERNAL USE4 SECURE ID – MARKET VIEW – TRENDS MARKET GROWTH IS MAINLY DRIVEN BY NATIONAL ID SECURITY LEADING TRENDS • Digitization of documents and online services • Convergence of applications • Derived IDs on mobile phones0 100 200 300 400 500 600 700 800 900 2013 2014 2015 2016 2017 2018 2019 2020 SMART CARD SHIPMENTS BY APPLICATION WORLDWIDE Passport National ID Healthcare Other  ! FRAUD ONLINE SERVICES KEY DRIVERS Source: ABI Research, Q1 2016
  • 6. EXTERNAL USE5 MARKET POSITION 49,0% 31,8% 11,2% 6,2% 1,7% Secure IC Vendor Market Share FY 2014* #1 provider of e-Government secure IC solutions 83% (120+ out of 145+) countries that introduced eGovernment solutions use NXP 250+ out of 400+ projects worldwide are based on NXP´s Secure ICs *Source: ABI 2015
  • 8. EXTERNAL USE7 Evolution of tolling systems Once upon a time, there was “stop, pay, then go”…
  • 9. EXTERNAL USE8 …then came optical systems (image recognition)…
  • 10. EXTERNAL USE9 …then came active RFID systems…
  • 11. EXTERNAL USE10 …then came passive RFID…
  • 12. EXTERNAL USE11 …and today we have secure passive RFID! not to scale For maximum protection and best read reliability, use of license plates in combination with windshield stickers is recommended.
  • 13. EXTERNAL USE12 Secure passive RFID enables effective road tolling…
  • 14. EXTERNAL USE13 Secure passive RFID takes you well beyond tolling…
  • 15. EXTERNAL USE14 Secure passive RFID takes you well beyond tolling…
  • 16. EXTERNAL USE15 Secure passive RFID takes you well beyond tolling…
  • 17. EXTERNAL USE16 Secure passive RFID takes you well beyond tolling…
  • 18. EXTERNAL USE17 It turns your vehicle into ID document, payment or loyalty card eID
  • 19. EXTERNAL USE18 NXP solutions for AVI applications Passive UHF tag IC with cryptographic authentication world-leading long range contactless performance cutting-edge security implementation for tag authentication All based on international standards * GS1 (EPCglobal™ Inc.) UHF RFID Generation-2 Version 2.0 ** ISO/IEC 29167-10 for proof of origin based on AES (Advanced Encryption Standard)
  • 20. EXTERNAL USE19 FIDO U2F TOKENS FOR ONLINE AUTHENTICATION
  • 21. EXTERNAL USE20 Issues with online authentication • Passwords − bad passwords, key logging, guessing, phishing • SW based solutions − Cookie, certificates, OTP applications • HW based solutions One-Time-Password Smart Card / PKI USB Key • Security (MITM) • User experience • Phishable • Interoperability • Middleware • PIN required • No privacy
  • 22. EXTERNAL USE21 Mission of the FIDO Alliance is to change the nature of online authentication by developing technical specifications that define an open, scalable, interoperable set of mechanisms that reduce the reliance on passwords to authenticate users, support adaption, standardize specifications. INTERNET SERVICES SOFTWARE & STACKSCOMPONENT & DEVICE VENDORS About the FIDO Alliance
  • 23. EXTERNAL USE22 FIDO Value Proposition Easy to deploy: BYOD self registration model (no issuance), no PKI, no middleware required Interoperability: Open specification (client and server) Security: Public key cryptography, no phishing, no MITM, vendor verification, tamper resistant by SE Privacy: Site specific keys No unique ID per device MITM: Man-in-the-middle/browserBYOD: Bring your own device SE: Secure Element PKI: Public Key Infrastructure
  • 24. EXTERNAL USE23 UAF U2F FIDO is promoting two authentication protocols
  • 25. EXTERNAL USE24 UAF U2F Both specs have seen large scale adoption
  • 26. EXTERNAL USE25 Government participation in FIDO Alliance Increasing government participation in FIDO Alliance Since adoption/deployment of full PKI solution is slow, new topics like FIDO or derived identity are getting traction • Use cases − Elster USB key − FIDO enabled PIV card • Recent news (April 2016) GOV.UK Verify service becomes the first government service in the world to support a FIDO U2F authenticator based on open standards
  • 27. EXTERNAL USE26 USB In combination with USB • 2-chip solution allows flexible MCU selection • MCU allows flexible driver support (HID, CCID,…) and write protection to prevent USB firmware attacks • MCU may support wide range of peripherals (storage, display, battery, PIN pad,…) Secure Element Solutions for FIDO U2F Maximum security and flexibility for any interface combination In combination with NFC • SE fully integrated with ISO14443 interface In combination with BLE • Many SE interfaces available (UART, I2C, SPI) Secure Element
  • 28. EXTERNAL USE27 USB Ref DesignIC solutions NXP solutions for FIDO U2F tokens Single IF or DIF SEs Multiple Interfaces • Smart card ISO7816, 14443 • Wired I2C and/or SPI Java OS + FIDO U2F applet USB Controller with multiple GPIOs • LCD, LED • PIN-pad, Button • Flash storage Single IF or DIF SEs Multiple Interfaces • USB only • USB+NFC • BLE only • BLE+NFC Ready for mass production Gerber files + BOM FIDO Approved