Josef Noll, 26.4.2005 RFID - NFC tutorial 1 Near field communication and RFID – opening for new business Josef Noll 1 , Juan Carlos Lopez Calvet, Telenor R&D, , N-1331 Fornebu [email protected], [email protected]1 from 1.6.2005 Prof. stip. University Graduate Studies (UniK) N-2027 Kjeller
63
Embed
Near field communication and RFID - opening for new business
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Josef Noll, 26.4.2005 RFID - NFC tutorial 1
Near field communication and RFID – opening for new business
– Authentication – your own phone– Infokiosk – imagine the world
– Payment and ticketing (Giesecke& Devrient)
– NFC and mobile Commerce (Nokia/Telenor)
Josef Noll, 26.4.2005 RFID - NFC tutorial 3
Telenor R&D
Important contributor to innovation and value creation in Telenor
Demonstrating: “Ideas that simplify
Tromsø (17)
Trondheim (23)
Fornebu (170)
Norway – what happened?
International: NO, SE, DK, Hungary, Austria, Montenegro, Malaysia, Ukraina, Bangladesh, Thailand, Russland
Josef Noll, 26.4.2005 RFID - NFC tutorial 4
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
–The upcoming digital world – need for seamless authentication
– RFID basics, frequencies, …– Applications: Sports, etc.
Josef Noll, 26.4.2005 RFID - NFC tutorial 5
Service development
1G:
1970 1980 1990 2000 2010
3G:
2G:
B3G:
Mobile telephony
Mobile telephony, SMS, FAX, Data
Multimedia communication
Personalised broadband wireless services
Josef Noll, 26.4.2005 RFID - NFC tutorial 62001 2005 2008/2010
Service Network
2G/GPRSServices
Packet and circuit switched
Packet switchedonly
Open Services Access
Cyberworld
Ubiquitous Services
Community PersonalNetwork
Core Network
UMTSUMTS R5
Programmable Networks
IP Backbone
Modular Protocols
QoS Mobility
Access Network
GERAN PAN
WLAN ++
Ad Hoc
New CellularUbiquitous
accessIP AccessWLAN
Terminal Technology Multi-
modeSW
RadioSingle-mode
reconfigurability
PAN…wearables, open architecture(s)
Radio Technology
CDMATDMA
OFDM
MIMO UWB SW Radio
WRC’03 WRC’06
MSS HAS
Source: Eurescom P1145
Josef Noll, 26.4.2005 RFID - NFC tutorial 7
Keep customers:Enable the Open Access Network
Millions of fixed lines function asfeeder lines for open pico-base stations
fixed
Subscribers’fixed lines
UMTS
GSM/GPRS
Open access network
+
Supported by seamless authentication based on the Mobile Phone
Personalised and broadband services
Josef Noll, 26.4.2005 RFID - NFC tutorial 8
Future Service composition(transparent for the end customer)
Next Generation Applications:– Customized services– Complex to manage
– High flexibility
– Short time to market
– Complex Telecom-IT integration
Telecom challenges– Support the customer:
security, personalisation
– Join forces with others
– Adaptive & composed services
My Company
App1
App2
App3 Support
Comp.WEB SAP
Telecom Operator
Security
Telecom access
Interface
Interface
Alternative
Home WorkFriend Train
CarHotel
RoamingPersonal
Profile
Location
Interfaceplatform
Josef Noll, 26.4.2005 RFID - NFC tutorial 9
Need for an identifier
Real world: see and/or talkVoice
Face
Virtual world: email, webUsername, passwd
SIM
PKI
Service world (between providers)Identity management
Service level agreement (SLA)
Trust relation
Josef Noll, 26.4.2005 RFID - NFC tutorial 10
Local interactions are a natural step toward multi-radio access of complementing radio technologies
BT
RFID
WLANWCDMA
Cellular Access Hot Spot Access
Broadcasting world:mass media
TV
Proximity world:local servicespersonal area
Cdma2000 1x
DVB-H
"personal, trustworthy, seamless global roaming"
"richest available content, browsing
just for the fun of it"
“CNN news, Sugar Bowl on the road"
“local interactions, service discovery & access,
ticketing "
EDGE
HSDPA
CDMA 1x EV_DV
GPRS
FM radio
Visual radio
Source: Andreas Lundin, Nokia
Josef Noll, 26.4.2005 RFID - NFC tutorial 11
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
–The upcoming digital world – need for seamless authentication
– RFID basics, frequencies, …– Applications: Sports, etc.
Josef Noll, 26.4.2005 RFID - NFC tutorial 12
What is RFID?Stands for Radio Frequency Identification
Mostly used for Access Control and Vehicle Immobilizer
The data carrier is generally called a “Tag” and attached to an item or location
Tags are passive (battery-less), in sticker or disc format
Radio frequency 13.56 Mhz globally the most widely used for RFID
The data gatherer is termed a “Reader”, e.g. integrated to Nokia 5140 phone
Source: Andreas Lundin, Nokia
Josef Noll, 26.4.2005 RFID - NFC tutorial 13
RFID Tag (Transponder)
Consist of microchip that stores data and antenna
Active transponders have on-tag battery
Passive transponders obtain all power from the interrogation signal of readerActive and passive only communicate when interrogate by transceiver
Available in all forms
Josef Noll, 26.4.2005 RFID - NFC tutorial 14
Some technologyRFID – available on tape
Price per. RFID tag: down to 0.04 €
Inductioncoile
The chip
3
Source: Tor Hjalmar Johannessen, Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 15
RFID Reader (Transceiver)
Consist of a RF module, a control unit, and a coupling element to interrogate tags via RF communication
Also have secondary interface to communicate with backend systems
Reads tags located in hostile environment and are obscured from view
Josef Noll, 26.4.2005 RFID - NFC tutorial 16
Example RFID Readers
Source: Andreas Lundin, Nokia
Josef Noll, 26.4.2005 RFID - NFC tutorial 17
RFID Tag Average Selling Price
0,00
0,10
0,20
0,30
0,40
0,50
0,60
2000 2001 2002 2003 2004 2005 2006 2007
US
D p
er t
ag
Source: Andreas Lundin, Nokia
Josef Noll, 26.4.2005 RFID - NFC tutorial 18
RFID – communication modes
RFID tag:- microchip attached to an antenna - sends signals to a reader. - contains a unique serial number, but may have other information, such as a customers' account number.
Inductive Coupling
Propagation Coupling
Aktive (own power) Range: ad lib (no limit) Passive (inductive) Range: from mm to some metres
Source: Tor Hjalmar Johannessen, Telenor
Reader (passiv RFID):- Inductor to create electromagnetic field in tag- Receiver for radio response from tag
(ROM-value: up to 600 bytes, typical 64-128 bits
Josef Noll, 26.4.2005 RFID - NFC tutorial 19
Security:Magnetic Field Power drop off
Source: Auracomm.com
Josef Noll, 26.4.2005 RFID - NFC tutorial 20
Tag principles
RFID-tag
- own processor-w/ EEPROM / flash-ROM & RAM
Source: Tor Hjalmar Johannessen, Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 21
Principle function – passive RFID
1. RFID comes close to a contact point
2. Contact point induces magnetic field (to the magnetic coil)
3. Coil generates power for the chip (which starts immediately)
4. Chip generates RF response (RFID)
Reader
To backend system
RFID-tag
Source: Tor Hjalmar Johannessen, Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 22
Frequency area - applications
Frequency Band Characteristics Typical Applications
Low100-500 kHz
Short to medium read rangeInexpensivelow reading speed
Euro bank notes to embed RFID chips by 2005http://www.eetimes.com/story/OEG20011219S0016
Money identification:
Source: Tor Hjalmar Johannessen, Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 26
Credit card-developments towards RFID
Source: Mastercard
Josef Noll, 26.4.2005 RFID - NFC tutorial 27
Mastercard PayPasswww.paypass.com
Josef Noll, 26.4.2005 RFID - NFC tutorial 28
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
–The upcoming digital world – need for seamless authentication
– RFID basics, frequencies, …– Applications: Sports, etc.– Potential Risks
Josef Noll, 26.4.2005 RFID - NFC tutorial 29
Potential Security Problems
Security problem 1: RFID is easy to clone
- hide a reader in a lift door, a chair, or other places you come closeRead respons and programme a separate tag with same RFID id.The user can’t know where reading took place. Difficult to trace later on
Security depends on application– Nice to know: WLAN network access
– Need to know: email, Intranett– Have to know: VPN, (eCommerce)
Higher level require more than just username & passwordhttp://www.openauthentication.org/ suggests 3 methods
– SIM authentication (GSM, EAP-SIM,…)– Public Key Infrastructure (PKI)
– One-Time-Password (OTP)
In-line with requirements from Norwegian government for eSignature Depending on application: username & password or PKIThe Mobile phone has all three: SIM, PKI, and OTPChallenge: Usability and exchange of credentials to “my working devices”
Josef Noll, 26.4.2005 RFID - NFC tutorial 38
The only thing you need:Your Mobile Phone
SIM with RFID & PKI
Josef Noll, 26.4.2005 RFID - NFC tutorial 39
Four-in-one: Your mobile integrates them all
Sec
urity
Req
uire
men
t
Nice to know
Needto know
Haveto know
Examples:
mHandel,VPN
Intranet, email,Admittance
Network access
*Patent pending
&* RFID (& SIM)
&
* RFID & SIM passwd
*
&
RFID, SIM & PKI
Josef Noll, 26.4.2005 RFID - NFC tutorial 40
Service access
Seamless authentication
Physical access
VPNHome access,
.mp3, .jpg
Josef Noll, 26.4.2005 RFID - NFC tutorial 41
Timeline: Phone with RFID & PKI
Near Field Communication (NFC)
Standardisation of Philips, Nokia, Sony, …
Phones with RFID chipPhone status: Nokia: on stock, Siemens: prototypes
SIM card with integrated RFID
Prototypes available from:– Giesecke & Devrient:
demonstrated on Siemens phones
– Gemplus: both on one chip, (terminated) NFC
Josef Noll, 26.4.2005 RFID - NFC tutorial 42
Near Field Communication (NFC) is a touch-based RFID technology
• NFC works in the globally available 13.56 MHz band• The effective working distance is up to a few centimeters• Based on ISO 18092 including ISO14443A MiFare and FeliCa
standards, ie compatible with the most broadly established smart card infrastructure covering >80% of the market
Technology
Tags
Devices
• Tags in smart objects are powered by the radio signal of the reader, and do not require any battery or other source of power
• The tags contain some memory that can store URLs, SMS and similar information
• Costs currently a few ten EUR cents and decreasing rapidly
• Devices do not contain tags, but can communicate using the same interface
• Devices can not only read tags, but also write to enabled tags
Sources: Nokia, Froster & Sullivan; Forrester
Josef Noll, 26.4.2005 RFID - NFC tutorial 43
NFC changes the role of the mobile operator
The mobile operator is the communication provider– Everybody has a mobile phone
– People know that they can reach me – and not my parents– Companies have identified the value of personal phones and change their
infrastructure– The phone carries all my contacts
– Connected 24/7 (all the time, not just 4 h a day)
From access to communication– Provide communication: voice, SMS, MMS, IM,
email,….– Seamless login (wap.telenormobil.no) – my
email, last 10 visited
Provide presence and community servicesProvide authentication and security
Josef Noll, 26.4.2005 RFID - NFC tutorial 44
Near field communication (NFC) Based on RFID technology at 13.56 MHz
Typical operating distance 10 cm
Compatible with RFIDData rate today up to 424 kbit/s
Philips and Sony
ECMA-340, ISO/IEC 18092 & ECMA-352, …standards
Powered and non-self powered devices
Josef Noll, 26.4.2005 RFID - NFC tutorial 45
NFC applications
Source: ecma, tc32-tg19-205-013.pdf
Josef Noll, 26.4.2005 RFID - NFC tutorial 46
Near field communication (NFC) - Applications and Compatibility
ApplicationsTransmit pictures from Camera to PC or TVDownload applications or gamesConfigure communication parameters in e.g. home network
Smart card compatibility (Philip’s MIFARE and Sony’s Felica)Secure NFC (NFC + smart card)Active or passive operation
Josef Noll, 26.4.2005 RFID - NFC tutorial 47
“How does it work?”Nokia Field Force Solutions
http://www.nokia.com/nokia/0,,70857,00.html
Better service idea?
Click to start flash
Josef Noll, 26.4.2005 RFID - NFC tutorial 48
NFC standardisation
ECMA-340Specifies the RF signal interfaceInitialisation, anti-collision and protocols
Communication mode selection mechanism ECMA 352 (v1, Dec 2003)
Selects communication modes: NFC, PCD, and VCDEnables communication in that mode
Josef Noll, 26.4.2005 RFID - NFC tutorial 49
Near Field Communication Interface Protocol (NFCIP) - finalised
Josef Noll, 26.4.2005 RFID - NFC tutorial 50
NFCIP-2 Interface and protocol(ISO/IEC 21481)
ECMA-340ISO/IEC 14443
PCD mode
(MIFARE, FeliCa)
ISO/IEC 15693VCD mode
(facility access)
InterfaceStandards
Josef Noll, 26.4.2005 RFID - NFC tutorial 51
NFC Interface and ProtocolSummary
Josef Noll, 26.4.2005 RFID - NFC tutorial 52
ECMA: NFC work items & future plans
Work itemsECMA-356: RF interface tests for ECMA-340 devicesECMA-362: Protocol Test Methods
Future working itemsA mapping of NFC to other communication protocols including the Internet Protocol (IP), GSM and Bluetooth
– Advanced Logical Link Control with addressing and segmentation support
Support for Data Link and end-to-end security and key managementAir-to-wired interface specificationApplication extensions in NFCIP-1
– Power control as an example application extension
Josef Noll, 26.4.2005 RFID - NFC tutorial 53
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial