Top Banner
Revıew the Winter 2011 Get the message The power of mobile marketing and advertising The latest in electronic and mobile healthcare Mobile innovation in Asia Why Belgium leads the way in eID How machines started talking: the rise of M2M hungry? you’re only 100m from tasty pizza. click ok to get a 15% discount today
40

Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

Aug 04, 2018

Download

Documents

vuquynh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

Revıewthe

Winter 2011

Get the messageThe power of mobile marketing and advertising

The latest in electronicand mobile healthcare

Mobile innovation in Asia

Why Belgium leadsthe way in eID

How machinesstarted talking: the rise of M2M

hungry? you’re only 100m from tasty pizza. click ok to get a 15% discount today

Page 2: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

Upfront

2 The Review

The world of digital security continues to expand at an astonishing rate, and 2010 was another dynamic year. Eurosmart reported in December that the

total number of microcontroller-based smart secure devices shipped during the course of the year was expected to exceed 5.3 billion – an 18% increase on the 4.5 billion units shipped in 2009.

One of the biggest growth areas is embedded mobile connectivity for the Machine-to-Machine communication market. On page 28 of this issue we take an in-depth look at the Internet of Things and examine the implications of a world where smart machines can talk to each other without human intervention.

Eurosmart also revealed that more than 4 billion SIM cards were shipped last year, boosted by the growing popularity of Near-Field Communication and mobile payment technology, among other things. In my capacity as President of Gemalto Asia, it came as no surprise to learn that growth was particularly strong in China and India. These are two of the countries we focus on in our feature on mobile innovation in Asia, which reveals the amazing range of applications that are helping to make people’s lives easier across the continent. Turn to page 8 to learn more.

Continuing the mobile theme, we examine the current state of the mobile marketing and advertising industry (page 18); the spread of mobile health applications, particularly in the developing world, features in our survey of eHealthcare (page 22); and in the Bulletin section we report on a successful mobile banking service in Colombia.

Also in Bulletin we introduce eGo, a revolutionary new technology that uses the conductive properties of human skin to provide a secure, personal way of accessing a wide range of digital services. I’m delighted that eGo was named Best IT Security Application at the 2010 Sesames Awards – further proof, if any were needed, that Gemalto is at the cutting edge of digital innovation.

Teck Lee TanChief Innovation and Technology Officer & President Asia, Gemalto

The many faces of mobile 4

8

The Review is published by Gemalto Corporate Communications – www.gemalto.com

© 2011 Gemalto – www.gemalto.com. All rights reserved. Gemalto, the Gemalto logo and product and/or service names are trademarks and service marks of Gemalto NV and are registered in certain countries. The views expressed by contributors and correspondents are their own. Reproduction in whole or in part without written permission is strictly prohibited. Editorial opinions expressed in this magazine are not necessarily those of Gemalto or the publisher. Neither the publisher nor Gemalto accepts responsibility for advertising content.

For further information on The Review, please [email protected]

The Review is printed on 9Lives 55 Gloss & Silk paper. Certified as an FSC mixed sources product, 9Lives 55 is produced with 55% recycled fiber from both pre- and post-consumer sources, together with 45% FSC certified virgin fiber from well-managed forests. C

over

imag

e: G

etty

18

Page 3: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

Your award-winning magazineIn November 2010, for the second

year in a row, The Review was named Best Business-to-Business Title at

the APA International Customer Publishing Awards. The prestigious

awards recognize excellence in customer publishing

worldwide.

3 www.gemalto.com

4 DIGITAl DIGesTWhat’s new in digital security

8 soluTIonsAsia embraces mobileThe latest services in Asia, from payment to mobile ID

12 BulleTInMobile banking in Latin America; introducing eGo; Moroccan citizens get biometric ePassports

16 TRenDsInside IntelCarol Wilder explains why the company’s new processor is a game-changing innovation

18 soluTIonsThe power of mobile marketingTurning the mobile phone into a targeted promotional channel

22 soluTIonseHealth and safetyThe latest developments in electronic and mobile healthcare

26 THe BIG pIcTuReNo more standing in lineeBanking brings benefits to banks and their customers alike

28 InnovATIonMachines get chattyThe Internet of Things looks set to drive mobile growth

32 GloBAl snApsHoTSignificant facts and figures from around the digital world

34 socIeTYWhy eID is big in BelgiumWhat can other countries learn from Belgium’s successful national eIdentity scheme?

36 In BRIefThe latest Gemalto news and success stories

38 DIGITAl lIvesA secret heroMathematician Marian Rejewski didn’t get the credit he deserved for cracking the Enigma code

As well as editing mobileb2b.co.uk, the news and analysis portal for the mobile marketing industry, Nick writes about mobile for The Guardian and London business newspaper CityAM.

contributorsTamsin oxford

Contents

Dave has been writing about technology and computing for over 15 years. He also works as a consultant to small businesses looking to move online.

Tamsin has been a journalist and editor for 18 years. She specializes in the consumer and business IT markets and has edited titles such as PC World Magazine.

34 “We want people to use the power of their mobile phone, tablet or computer to better their lives”Carol Wilder, Intel

28

16

12

Dave Howell

nick Booth

The Review is produced for Gemalto by Wardour, Walmar House, 296 Regent Street, London W1B 3AW, UK Telephone: +44 (0)20 7016 2555Website: www.wardour.co.uk

For Gemalto:coMMunIcATIons MAnAGeR

Laurence Manouelides

For Wardour:eDIToR Tim TurnerDesIGn DIRecToR Ben BarrettART DIRecToR Steven GibbonDesIGneR Angela LyonspIcTuRe eDIToR Johanna WardAccounT DIRecToR Rob SawyerpRoDucTIon MAnAGeR John FaulknerMAnAGInG DIRecToR Claire Oldfieldceo Martin MacConnol

Page 4: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

Industry update

Digital digestE

VEN

TS C

ALE

ND

AR

Gemalto regularly participates in trade shows, seminars and events around the world. Here’s a list of those taking place in the next few months:

4 The Review

The greening of ITAnnual CO2 emissions from IT equipment have been reduced by more than 32 million metric tons worldwide since 2007 – the equivalent of taking nine coal-fired power stations offline.

These results can be attributed in part to the efforts of the Climate Savers Computing Initiative (CSCI), an international coalition of IT companies, to accelerate the adoption of computer power management, introduce new efficiency standards for computing technologies, and develop and deploy more efficient computer equipment.

The CSCI is now turning its attention to networking devices, which will increase energy use by 6% a year unless there is a concentrated effort to improve their energy efficiency.Source: www.climatesaverscomputing.org

eGovernment in actionThe European Commission has published an eGovernment Action Plan that sets out the steps it will take in the next five years to expand and improve online public services.

The plan has four priorities: user empowerment, reducing barriers to online services in the EU internal market, improving the efficiency and effectiveness of public administrations, and establishing the preconditions for eGovernment. It is a fundamental part of the Digital Agenda for Europe, which aims to increase the use of eGovernment services by citizens to 50%, and by businesses to 80%, by 2015.Source: http://ec.europa.eu

Date Event Sector Location

14-17 Feb 2011 Mobile World Congress

Telecoms Barcelona, Spain

14-18 Feb 2011 RSA Conference Online authentication

San Francisco, USA

20-24 Feb 2011 Himss Conference 2011

Online authentication

Orlando, USA

20-24 Feb 2011 CTIA Wireless 2011

Telecoms Orlando, USA

8-10 Mar 2011 8th Pan European High Security Printing Conference

Security Vienna, Austria

15 Mar 2011 Mobile Retail Masterclass

Telecoms London, UK

23-24 Mar 2011 Pay Forum eBanking Paris, France

4-6 Apr 2011 Secure Document World

Security London, UK

Page 5: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

IIIIII slug_ Slug IIIIII

IMA

GE:

DA

NIE

LE M

ATTI

OLI

/ A

NzE

NB

ERG

ER

By THE NUMBERS

120 millionThe number of high-speed LTE (Long Term Evolution) connections in Asia Pacific will exceed 120 million by 2015, according to new data released by Wireless Intelligence. Major Asian countries are currently driving the uptake of LTE mobile broadband in the hope that it will facilitate a wide variety of benefits in areas such as education, health and trade.Source: www.gsmworld.com

63%A poll by Unisys reveals that consumers trust fingerprint biometrics to verify their identities when using a credit card or requesting personal information. The online poll found that 63% of respondents thought that fingerprint biometrics were the best method of identity verification and authentication; 20% preferred photo identification, 13% PINs and just 6% handwritten signatures.Source: www.findbiometrics.com

5.3 billionIn 2010 there were 5.3 billion mobile phone subscriptions worldwide, up from 0.719 billion in 2000; this represents 76.2 subscriptions per 100 people, compared with just 8 per 100 people 10 years earlier. The total number of internet users worldwide rose from 0.361 billion to 1.96 billion over the same period.Source: http://holykaw.alltop.com

2011: a boom year for NFC?

Scientists at the Free University (FU) in Berlin, Germany, have unveiled a new driverless car – one of several currently in development around the world.

The vehicle, which looks like an ordinary VW Passat, uses cameras, laser scanners, heat sensors and satellite navigation to ‘see’ other vehicles and pedestrians and respond to traffic signals. “In the future it will be forbidden for safety reasons for people to drive cars,” claims Raul Rojas, a professor at the FU, adding: “Autonomous cars are the real ‘green’ cars. We could use a fraction of the cars that we have now.”

Source: www.physorg.com

The communications industry has been waiting for Near-Field Communication (NFC) technology to break through into the mainstream for a while, and there are signs that 2011 could be the year that it finally happens, paving the way for a boom in mobile payments and other innovative applications.

For example, a recent report from Mercator Advisory Group forecasts that 116 million smartphones equipped with NFC will be shipped globally in 2011. Similarly, research firm iSuppli expects NFC to begin an explosive growth phase this year. It predicts that worldwide shipments of cellphones with

built-in NFC capability will rise to 220.1 million units in 2014, up by a factor of four from the 2010 figure of 52.6 million.

Meanwhile, mobile network operator Orange will begin introducing NFC services in the majority of countries in which it has a presence this year. It will start issuing NFC SIMs to subscribers “in most of the Group’s European operations” and is working with handset manufacturers to ensure that more than half of the new smartphone models it buys have built-in NFC functionality. Sources: www.digitaltransactions.net, www.smartcardstrends.com and www.nearfieldcommunicationsworld.com

Hands-free driving

continues >

5 www.gemalto.com

A hi-tech cityZhenjiang in China plans to transform itself into a hi-tech city with wireless communications that will support remote healthcare, transport and eEnergy solutions. The city has commissioned Nokia Siemens Networks to provide a Machine-to-Machine platform that will underpin this transformation.

The aim is to create an Internet of Things ecosystem (see feature, p28). Practical applications will include remote medical monitoring services and an application that will manage, track and monitor taxis to provide real-time information on the vehicles’ operational status and on traffic congestion.Source: www.nokiasiemensnetworks.com

Page 6: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

>

5

6

Industry update

The Review

Mobile maternity advice

Taking all these factors into account, the report recommends that technology and service providers need to accelerate customer care and insight programs to remain competitive in an environment where customer service, design and user interface are critical differentiators.Source: www.gartner.com

The spread of mobile phones in the developing world has made possible a range of initiatives in the field of health. One such project is taking place at Pumwani Maternity Hospital in Nairobi, Kenya, where SMS messages are being used to help HIV-positive mothers avoid passing the virus on to their children.

“Through this telephony they are being empowered with information,” explains Frida Govedi, the hospital’s Chief Executive Officer. “How they should eat, when they should take their vitamins, when they should come for their CD4 counts. It is an interactive medium between the mother and the healthcare worker.”

The SMS messages are programmed into a computer and sent out automatically, but when that system is down, a health worker has to send them out manually. Juliet Wangari Njuguna, a research nurse with the Kenya AIDS Control Project, says it’s worth the extra effort. “It feels good that you are doing something. They tend to ask you all sorts of questions, which is better than being at home and assuming things.”Source: http://allafrica.com

The shifting balance of economic power and influence is reflected in a new forecast of the global online population by region. In the five-year period between 2009 and 2014, the biggest growth in internet use will be in the Asia Pacific region. The number of people online there is predicted to increase from 645 million to 1,033 million, or 44% of the global online population, compared with the current figure of 39%.

The Middle East and Africa region is also expected to make up a larger share of the global online population, growing from 8% to 10%. The forecast says that this growth will come at the expense of the West, with Europe’s share falling from 26% to 22% and North America’s from 16% to 13%.

Source: Forrester Research World Online Population Forecast, 2010 to 2014

Eastern promise

Market research firm Gartner has identified the ‘Top 10 consumer Macro-Trends, Worldwide, 2010–2020’ that will affect companies that provide consumer technologies and services:

1. economic and social dislocation are redefining the meaning of ‘value’

2. event-driven global communities will affect network design

3. consumer attitudes toward status and identity are evolving

4. mainstream consumer-driven innovation is fast becoming a critical differentiator

6. privacy and trust will become the critical currency of mainstream brands

7. ‘it-ization’ vs ‘consumerization’: consumers are becoming moving targets for marketers

8. changing attitudes to spaces, places and proximity are reshaping consumer demand across the product spectrum

9. emotional appeal is vital to connect with the increasingly disloyal ‘loyal’ consumer

10. new approaches are now needed to reach out to the ‘social’ consumer.

10 trends to watch for

generational change is driving the shift toward screen-based consumption

Page 7: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,
Page 8: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

8 The Review

solutions_ Mobile in Asia

embraces mobile

Across the Asia-Pacific region, a wide range of innovative mobile applications are helping to make people’s lives easier. The Review reports on the technologies that are making waves

AuTHoR CATH EVERETT

Page 9: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

9 www.gemalto.com

>

Asia is the continent to watch these days. The global financial crisis has accelerated a trend that had already seen the balance of power starting to shift eastwards, with South and East Asia in

particular expected to play a progressively more crucial economic role in a post-recessionary world.

But economics is not the only field in which the Asia-Pacific region is beginning to make its mark. Another is digital innovation, especially in the field of mobile payments. Japan and South Korea lead the region here (see p25), while emerging markets such as China, India, Indonesia and the Philippines are showing rapid uptake of mobile banking services such as person-to-person transfers and remittances.

“Even in emerging markets such as Bangladesh, Pakistan and Sri Lanka, mPayment services are becoming increasingly popular,” says Frost & Sullivan industry analyst Shaker Armin, “although they’re mostly limited to SMS-based bill payments and micro-credit transfers.”

As a result, he expects the value of the Asian mobile payment market to double from US$1.6 billion in 2009 to US$3.6 billion by 2015, an annual compound growth rate of 14.8%. By way of comparison, the value of mobile transactions undertaken by consumers in the US and Western Europe is likewise expected to double, from US$100 billion in 2010 to US$200 billion in 2012, according to Juniper Research.

In Japan, travelers can download tickets for journeys with the East Japan Railway Company to their mCommerce-enabled devices using NTT docomo’s electronic wallet technology and similar services from KDDI and Softbank Mobile.

Meanwhile, in Australia, a large number of consumers now have two 3G-based phones, one for personal use and one for business. They use these for everything from accessing social networking sites to making cheap voice-over-IP calls and enjoying mobile chat, which enables them to hold two-way SMS-based conversations with visitors to their website.

To give a taste of how digital innovation is making itself felt in people’s day-to-day lives in Asia, we’ve focused on three very different, but equally important, markets: China, India and Singapore.

Page 10: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

solutions_ Mobile in Asia

>

The Review10

China is not only the fastest-growing economy in the world, but also the largest market for mobile phones. Just over half of the country’s total population of 1.4 billion use them for everything from accessing information to paying for goods and services, as well as social networking.

Mobile phone penetration is almost 100% in large cities such as Beijing and Shanghai, and adoption is rising quickly in smaller towns and rural areas, not least because mobile operators are starting to offer applications tailored to subscribers’ specific requirements. For example, China Mobile’s Agricultural Information service gives users weather updates, advice on raising crops, the current market prices of different goods and much more.

One increasingly popular service is contactless payment. IT research firm Analysis International says the number of contactless users in China grew from 27.2 million in 2009 to 49.2 million in 2010. The market, which is currently worth 2 billion yuan, is expected to grow at an annual compound rate of 70.4% over the next three years.

Contactless payment is an appealing alternative to bank

cards for many Chinese who are not so familiar with ‘paying by plastic’. Consumers in Chongqing province, for instance, can now use the Cqpass mobile payment system to pay for travel on the regional transit network, as well as for a range of other goods and services. The system is based on Near-Field Communication (NFC) technology and uses a custom-made mobile phone.

Viewing of mobile TV services is also on the up since China Mobile and the China Broadcasting Corporation launched China Mobile Multimedia Broadcasting in March 2010. It offers 3G subscribers in more than 300 cities around the country six channels to choose from.

Finally, the Chinese are becoming a nation of social media fans. Millions now log on to social networking sites (the biggest, Renren, claims 165 million users), which they see as an opportunity for self-exploration. As a result, sites like Renren and its main rival, Kaixin001, generate the bulk of their revenues from the sale of virtual avatars and applications, rather than from the lifestyle-oriented online advertising that is so prevalent in Europe and the US.

Over the next three years, India is expected to take over from China as the world’s biggest cellphone market. According to Informa Telecoms and Media, the country had 508 million active mobile subscribers in 2009; growth rates of 128% will see that rise to 1.159 billion by 2013.

Mobile penetration rates are forecast to move onto a par with Western levels, at 101% by the end of 2014. This reflects both the growing use of multiple devices and the speed with which mobile communications are becoming a mass-market tool in India. For example, although relatively few Indian citizens have access to broadband internet, India is the second fastest-growing market for Facebook, beaten only by Indonesia. This is because, rather than using PCs, many people are accessing the site from their mobile phone or using a data card over a wireless network.

In a bid to exploit the rising appeal of mobile, the Indian government auctioned the country’s 3G spectrum in May 2010. 3G services started appearing in large cities at the

end of the year and are expected to be rolled out to other parts of the country throughout 2011. As a result, trade group GSMA forecasts that India will have 150 million 3G subscribers by the end of 2014, enabling them to have speedier and more convenient access to everything from music and movies to mobile TV and mCommerce.

Another area the government believes is key to the country’s economic development is mobile banking. While India has a population of 1.1 billion, only 200 million of its 600 million workers have traditional bank accounts.

Now financial services providers are introducing technology such as mobile wallets as an alternative. These enable people to add cash to their mobile phone, which they can then use to make payments or wirelessly transfer the money elsewhere. For example, in 2009 FINO launched MITRA, a mobile banking solution aimed at unbanked people in rural India. It enables them to use their cellphone for banking and other transactions, and as a mobile wallet.

china

India

Page 11: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

Japan and South Korea are currently world leaders when it comes to consumers using their mobile phones to make contactless payments. So it makes sense that the two countries, which have a long and complex shared history, are working together to provide NFC-based services at the same time as they discuss a free trade agreement.

Japanese mobile network operators KDDI and Softbank Mobile have got together with South Korea’s SK Telecom to

provide a cross-border range of NFC-based mobile payment, customer loyalty and promotional services. These range from coupons and digital cash to ticket payments and gift certificates.

While South Korea already has an installed base of 25,000 Combi Card contactless card terminals that are compatible with NFC phones, Japanese retailers use devices based on the NFC-like FeliCa chip from Sony, which doesn’t support tag reading in applications

such as interactive digital posters – a key driver behind the operators’ decision to move to NFC.

According to recent press reports, however, NTT docomo, which provides the 60 million ‘osaifu-keitai’ electronic wallets used by Japanese consumers today, is likely to migrate from FeliCa to an NFC technology in 2013, which should boost market uptake.

Meanwhile, in March 2010, SK Telecom began an eight-month trial of its T Smart Pay

service, which enables consumers to store up to eight credit cards, 30 membership/point/mileage cards and 50 coupons on their mobile phones. The offering is expected to form the basis of the new service provided by all three operators.

KDDI followed up a month later by launching another major NFC pilot with brands such as Toyota, Japan Airlines and Hitachi, but it is currently unclear when full commercial rollout will take place.

Japan and South Korea collaborate on NFC

11 www.gemalto.com

Singapore is a regional leader in South-East Asia when it comes to both mobile usage and digital innovation. The market penetration of mobile devices stands at 140.7%, compared with 130% in Western Europe, with services ranging from a wireless security alarm to digital rights management-free music downloads and mobile chat. The latter enables users to hold two-way SMS-based conversations with visitors to their website.

But citizens are also starting to use their mobile phones to access the first of a series of government services. The Infocomm Development Authority (IDA) of Singapore piloted a mobile application in 2010 that enabled it to use Singapore Personal Access (SingPass) to read retirement-related information held by its Central Provident Fund, and more services are expected to follow over time.

SingPass provides people with a single user name and password for accessing about 260 services provided by 58 different government departments. A total of 34.4 million transactions were undertaken using this identity information last year, with services ranging from filling in income tax forms to registering a new company.

Meanwhile, the Singapore government is encouraging the uptake of mobile eCommerce in the city-state. While

citizens mainly use smart cards to make contactless payments, mobile payment offers the prospect of new value-added services, ranging from online shopping to making restaurant reservations and buying tickets over the internet.

One such example is the Digital Concierge, developed by IDA and the Singapore Tourism Bureau to promote mobile information as a service for tourists. The initiative has since evolved to cover a much wider set of mobile eCommerce applications targeted particularly at the financial services, tourism, hospitality and retail industries.

By 2012, the aim is to provide local businesses with the necessary infrastructure to plug into, without having to invest prohibitive amounts of money themselves. A total of US$7.14 million will be assigned to the scheme over the next two years, by which time the goal is to have one million active users signed up.

Meanwhile, to encourage both citizens and businesses to undertake online transactions with financial institutions, the government has set up an organization to run a National Authentication Framework. The goal of the framework is to authenticate transactions between the government, businesses and citizens in a secure fashion.

singapore

The market penetration of mobile devices in Singapore

Page 12: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

12 The Review

news in focus

BulletinMobile banking

for the unbanked

■ With 90% of Colombia’s 45 million inhabitants carrying mobile phones, compared with just 17% with fixed lines and only 13% using fixed internet services*, the country has proved to be an ideal launch pad for the mass deployment of mobile banking.

This was kickstarted when Gemalto and Redeban Multicolor, Colombia’s largest financial network, launched the country’s first SIM-based secure mobile banking services. The project brought together Gemalto’s expertise in EMV card technology for banks and its SIM application services for the telecoms market.

Today, mobile operators in Colombia offer banking as part of a portfolio of wireless value-added services. On average, 1.4 million transactions are processed each month – an average of

eight per month, per user, with most using the service to top up prepaid accounts and check balances.

Colombia has a high crime rate, driven in part by the activities of drug cartels, so any technology that makes people feel safer is valuable. By enabling them to carry less physical

money, mobile banking does just that.What’s more, there hasn’t been a

single case of fraud related to the service. Hosting the application inside the SIM card guarantees the security of the system, as the SIM is a fraud-proof device that also stores cryptographic keys, algorithms and process data – it’s essentially the same technology as that used in chip banking cards. All the information processed in the card is coded before being sent over the mobile operator’s network and is only decoded at the mBanking gateway, where the transaction is verified.

Work is now under way to take the service to the unbanked. Only 26% of Colombians have bank accounts, which leaves about 28 million with no access to financial services.

Gemalto is developing the necessary platforms to change this. Soon, through any standard GSM network, mobile phones will be able to offer a complete suite of mobile financial services. For instance, by deploying an electronic wallet application that stores money, banks will be able to give all users – banked or unbanked – the ability to perform the transactions that are already incorporated into mobile banking services.

The mobile banking application is the answer to a real need in the market for banking services that are available any time, anywhere. Indeed, it’s likely that, before too long, mobile banking applications will be fully adopted not only by the banks, but also by non-bank financial entities such as PayPal.*Source: Global Insight, Latin Panel e-internet

World Stats

Illus

tratio

ns: L

eand

ro C

aste

lao fo

r Dut

ch U

ncle

Colombia has pioneered secure mobile banking services in Latin America – and soon this will even extend to people without bank accounts

1

“Hosting the application inside the SIM card guarantees the security of the system”

Page 13: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

IIIIII slug_ Slug IIIIII

13 www.gemalto.com

be completed in the next two years, adding that there are two stages. The first, perfecting the technology, is the easier of the two, as there are no foreseeable stumbling blocks so far. He sees the second stage – market, regulatory and social acceptance – as being more challenging. However, the two stages are being worked on concurrently in order to deliver the product to the market by the first quarter of 2013.

In the meantime, the digital security industry has already recognized the potential of eGo: it was named Best IT Security Application in the 2010 Sesames Awards at the Cartes & Identification show.

■ Imagine being able to unlock your front door simply by touching it, pay for your shopping without handing over any cash, cards or coupons, log in to your email on any computer without entering a password, or use any mobile phone with your account without inserting a SIM card. All this and much more will be possible with eGo.

The eGo project, currently being developed by a group of companies, including Gemalto, is taking wireless technology to new heights. It uses human skin to conduct electronic signals, enabling the exchange of data and authentication information for any transaction with just a touch. As eGo’s slogan puts it: “What you touch is yours!”

For example, let’s say you want to unlock the door of your car. When you touch the door handle, the small eGo device that you carry on you (it could be attached to your belt or your watch strap, for example) makes contact with the car’s electronic locking system, using your skin to transmit the signal. This contact then activates a second communication between the eGo device and the car; the former confirms that you are the legitimate owner and the latter unlocks the door.

“The intra-body communication uses an electric field to transfer the first message from an object you touch and another object you hold,” explains Alain Rhelimi, Technical Advisor at Gemalto, who is the inventor and project manager for eGo. “In modulating an electric field, you may transfer a signal through your garments over your skin.

“A fingerprint sensor on the eGo device allows for a two-factor strong authentication – what you have (eGo) and who you are (biometry). We don’t use the intra-body communication to identify an individual; the sensor plays this role.”

Funded by the European Commission, eGo is being developed within the CATRENE program (Cluster for Application and Technology Research in

Europe on NanoElectronics). It will initially be prototyped and integrated in several forms of miniaturized systems for ultra low-power transmitters for intra-body communication, a highly secure micro controller comparable to those embedded in smart cards, a large data storage capacity and a high-performance, high-speed wireless (Ultra Wide Band) transmitter for exchanging application data.

Rhelimi says he expects the project to

continues >

A new technology is being developed that provides a secure way of authenticating yourself and accessing services – and your skin is the key

The human touch

2

“Imagine being able to unlock your front door simply by touching it”

Page 14: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

14

news in focus>

Moroccan citizens can now apply for cutting-edge biometric ePassports, thanks to the comprehensive technical solution provided by Gemalto

Morocco introduces Africa’s first ePassport3

■ The Kingdom of Morocco has become the first country outside the European Union to issue next-generation biometric passports that include Extended Access Control (EAC), in accordance with European specifications. EAC is the technology that ensures that only authorized bodies are able to access biometric data stored on the contactless chip on an ePassport.

This is part of a wider drive on the part of the government to encourage the development and deployment of technology. The ‘Digital Morocco 2013’ initiative, launched in 2009, aims to expand the use of information and communications technology by the public, the government and businesses by 2013. At the launch of the initiative, Salaheddine Mezouar, Morocco’s Minister of Economy and Finance, said: “Technology is of fundamental importance in modernizing and developing the national economy.”

A passport acts as a symbol to the rest of the world of a nation’s identity, so it is fitting that Morocco should deploy cutting-edge ePassport technology. The comprehensive solution that Gemalto supplies to the Moroccan mint, Dar As-Sikkah, handles the process from end to end. It uses Coesys Enrolment to gather citizens’ details and data and Coesys Issuance to personalize the resulting passport; the Sealys eTravel product creates the covers, which include an integrated contactless microprocessor containing the holder’s digital fingerprint and photo, and implements a highly secure operating system. Gemalto also provides

installation, training and maintenance services. Deployment of the ePassports began in December 2009 and the supply contract covers a three-year period.

The biometric ePassport contains a page of personal information and several for visas, as well as an electronic chip containing additional private information about the owner of the passport. This information is gathered by Netopia, a leading integration services company for the public sector. Citizens can go to any of 83 prefectures and provinces or 125 embassies and consulates to have their fingerprints recorded; if they want, they can carry out the rest of the application process online using the portal developed by the Moroccan Ministry of Interior. This includes a tracking system so that applicants can find out when their passports will be ready.

Lahcen Hadouni, Head of Dar As-Sikkah, is pleased with the introduction of the ePassport. “A long-term partnership between Dar As-Sikkah, Gemalto and Netopia has been created through this program,” he says. “The project’s success reflects the close fit between the various players and the sustained commitment shown by a multidisciplinary team.”

The Review

“A passport acts as a symbol of a nation’s identity, so it is fitting that Morocco should deploy cutting-edge ePassport technology”

Page 15: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

We hope you are enjoying this issueof The Review. To help us make it even better, please take a few minutes to fill in our reader survey, which you can find at http://review.gemalto.com

You can also subscribe to the magazine at the same location. Subscriptions are free and we deliver the magazine directly to you. The first 75 people to subscribe using the online form will receive a YuuWaa – the new digital storage solution from Gemalto, with 8GB of online storage and 2GB of flash drive storage, as well as a flash drive backup.

Tell us what you think about the magazine – and subscribe for free Revıewthe

Don’t forget to tick the relevant boxes on the survey if you would like to take out a free subscription to The Review and/or our regular e-Newsletter. If you hurry, you could receive a free YuuWaa – the handy digital storage solution from Gemalto.

http://review.gemalto.com

15

Page 16: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

Xxxx_ Xxxxx

16 The Review

Trends_ Mobile innovation

Think of Intel and you probably think of computer chips. But, as the company’s Senior Strategic Planner Carol Wilder explains,its latest processor opens up the prospect of an exciting range of innovations in the mobile sphere

It’s hard to remember now, but in the early 1990s, Intel was a relatively unknown company, even though it supplied the chips that powered the personal computers of

the day. The advertising campaign that changed all that, ‘Intel Inside’, has made the company synonymous with most types of computers in the public’s mind. At the same time, many people think Intel exited the mobile phone business in 2006, when it sold its XScale division and its implementation of the ARM (Advanced RISC Machine) processor architecture.

“In reality,” says Carol Wilder, “what we said is, ‘What is Intel’s real value proposition?’” Wilder should know: she is the company’s Senior Strategic Planner. Wilder’s career at Intel has consisted of a succession of moves closer and closer to the wellspring of design ideas, from application engineering to marketing, and finally to strategic planning. “I wanted to effect change,” she says simply.

“A long time ago,” she adds, “I worked on the CPU [Central Processing Unit] that is coming out in February – Sandy Bridge.” A key element of the Sandy Bridge design is unifying the company’s offerings to give a more seamless experience – hence the “bridge” in the chip’s codename.

“When we looked at it, we decided we needed to have Intel value from top to bottom,” she says, “and to make the development experience easier so that we can port programs from one form factor to the next. When we had ARM it was a completely different CPU.” The company’s ‘Low Power on Intel Architecture’ research project began studying how to make low-power chips for low-cost and small form-factor computers, and that pathway led inexorably to mobile phones.

“Basically, we believe a couple of things,” Wilder says. “As we mature in the phone market, we can get devices to work better together and pull together a more unified user experience,

AuTHoR WENDy M GROSSMAN

“We want people to use the power of their mobile phone, tablet or computer to better their lives”

similar to the consistency that exists among Apple products.”

Mobile innovationsThat user experience is also going to become more complex, with the introduction of technologies that were being trialed in blue-sky research labs 15 years ago and are only now becoming a commercial reality.

“The main thing is that the phone is going to be an extension of a person,” Wilder says. “It will affect people’s lives in ways we never expected.”

She is looking forward to three things in particular: sensing technology, so that phones understand context; 3D; and augmented reality. On the latter, she says the current focus on assisting tourists with layers of information is only the beginning: “What will be more important is tagging personal videos and scene detection, and pulling together everyday videos so that you preserve memories and the data behind them.”

She adds that augmented reality will bring even more information when “everything goes to 3D”. On a phone? “A lot of people ask why they

Inside Intel

Page 17: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

Xxxx_ Xxxxx

17 www.gemalto.com

would want 3D,” she acknowledges. “But I brought in a demo from a screen manufacturer from Japan and set it up in Intel’s offices in Santa Clara and Portland, and I could not get people’s hands off that demo.”

privacy issuesAll these ideas, particularly things like collective and shared sensing, raise significant privacy challenges. This is an issue that Intel was forced to confront in the early 2000s. The company’s Pentium III processor was issued with unique serial numbers that, privacy advocates argued, would enable surveillance of computer users.

“That was a black eye for Intel, and the company likes to be above board,” Wilder says. “Now we have a privacy review board made up of lawyers and sociologists, and you have to defend your product in terms of how it’s going to protect privacy.”

As systems become more complex and more social, understanding how to design them to protect privacy has also become more difficult. At one end, you have the slider bar in Internet Explorer – easy to grasp conceptually and to configure, but uselessly broad in complex situations. At the other, you have something like Facebook’s privacy settings, so time-consuming to work through that many consumers give up.

“We think a computer or mobile phone should go through the inventory of what a person does and spell out how the settings are going to affect the top three apps or programs that person uses and show what’s going to be disclosed,” Wilder explains.

“It’s really important – we don’t want a backlash against devices because people are afraid. We want people to use the power of their mobile phone, tablet or computer to better their lives. It would be unfair if it said ‘no’ to everything.”

1968: Founded by Robert Noyce and Gordon Moore. Moore is famous for his 1965 observation that the number of transistors that can fit on a chip doubles approximately every two years. This came to be known as ‘Moore’s Law’1971: Creates the first commercial microprocessor chip1982: Chosen by IBM to supply chips for the first PCs1999: Creates a privacy uproar when it announces that it will introduce unique serial numbers for its Pentium III processors2005: Apple announces that it will make the transition to Intel chips for its computers2006: Sells XScale, the division that made chips implementing the ARM processor architecture2010: Buys the computer security company McAfee and Infineon Technologies’ wireless solutions business

Intel milestones

Intel’s new Sandy Bridge processor promises faster performance while using less power, as well as seamless integration with the rest of Intel’s product range

Page 18: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

solutions_ Marketing

Mobile marketing has been around for a long time, but it has grown dramatically in the past five years as handsets have become

powerful mini computers and mobile broadband networks have come of age. According to research firm Berg Insight, the global mobile advertising market was worth €1.75 billion in 2009; with a compound annual growth rate of 43%, Berg predicts that this will rise to €8.7 billion in 2014.

Demand for mobile commerce has been building up for decades, but when the problems of incompatibility and capacity were removed about three years ago, a boom was created, according to Paul Berney, Managing Director of the European branch of the Mobile Marketing Association (MMA). Although mobile marketing can be directed to any handset, Berney pinpoints the iPhone as the most effective catalyst for this explosion in demand, adding that Apple’s decision to use one network in each country encouraged all those networks’ competitors to raise their game, too.

What’s more, the app phenomenon and the superior user experience the iPhone provides have driven brands to make more use of mobile in their campaigns, benefiting the entire mobile ecosystem. Meanwhile, the decision by the leading mobile network operators to offer flat rates for data access removed a major

solutions_ Marketing

AuTHoR NICK BOOTH

18 The Review

source of consumer misgiving about mobile data usage.

There was a change in culture, too, which was beneficial for the technology companies offering their services to the marketing industry. “The mobile industry as a whole learned to speak to marketers in their own language, rather than in technical talk,” says Berney. But he claims that the biggest driver for mobile marketing has been a shift in consumers’ attitudes: “The appetite for mobile is growing rapidly, and people are suddenly seeing the possibilities for using their cellphone to solve all kinds of problems.”

A fast-growing marketPeter Simpson, Chief Marketing Officer for transaction facilitator Monetise, puts it more strongly. “I’ve been in marketing for 30 years and I’ve never seen anything take off so quickly,” he

time to change your car! click ok to book a test drive of our latest model

The power of mobilemarketing

The use of mobile phones for marketing and advertising has boomed in recent years, thanks to advances in technology and techniques. We investigate the power of the SMS

Page 19: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

19 www.gemalto.com

says. “Our market is growing by 50% every year.”

For the mobile network operators, the advertising and marketing industries have created a vital new seam of business that produces the revenue they need to sustain growth. The margins in voice calls have long since shrunk, but users could not be enticed to use data services, especially when downloading a video on a cellphone was painfully expensive.

Mobile marketing brought respectable revenue streams to the mobile operators, while the marketing industry discovered a far more effective method of reaching people than TV advertising or online marketing. It has an attractive combination of massive reach, high response rates and an ability to personalize messages that other media can’t match.

Another advantage is the range of opportunities within mobile marketing: SMS messaging makes up 55% of the sector and is

25% off all clothes today - just 50m away. click ok for your personal voucher code

“Mobile marketing works because it offers the end-user convenience”>

Page 20: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

20 The Review

solutions_ Marketing

still growing, but there’s also mobile search (which accounts for 20%), mobile banners (15%) and mobile apps (10%).

This all translates into impressive results. For example, according to Dynamic Logic, which measures the effectiveness of advertising campaigns, the intention to buy is four times greater among mobile users than online browsers. Interactive SMS campaigns can be even more powerful (see panel, opposite).

convenience countsMobile marketing works because it offers the end-user something they want: convenience. “People get the information when they need it,” says Colin McCaffery, Director of Products at global mobile communications organization 2ergo. For example, in England, 2ergo’s client ESPN has the mobile broadcasting rights to all Premier League soccer games. Most fans will want to see a roundup of that day’s goals while they’re away from their home, probably when they’re on the way back from attending a game themselves. So, at 5:15 every Saturday afternoon, any soccer fan subscribing to the service can view all the best footage of that day’s action on their handset, at a time when they want to see it.

The great advantage of mobile for end-users is that it gives them the route of least resistance to buying, according to Peter Simpson. They don’t need to turn on a computer and sit at a desk: they have the means of purchasing in their hands and it’s permanently switched on. “People start using something when it’s the easiest way of getting something done,” he says.

The fact that the phone is always on, always with us and easy to use makes this a great impulse marketing tool – in 2009, Amazon made US$1 billion in revenue from purchases on mobile phones. However, any company that abuses the privileges of this intimate mobile relationship may find that the reaction is equally hostile. “Hell hath no fury like a

customer spammed,” says Jonathan MacDonald, founder of communications consultancy Human Dialogue.

This is why permission marketing (also known as engagement marketing) is one of the most important areas right now. Consumers are happy to receive mobile marketing messages if they are relevant, personalized, transparent and offer some kind of benefit or reward. But they want to be asked for their permission to receive such messages, so companies that operate in the mobile advertising market need to implement best practice around permission marketing. This means creating large and qualified opt-in databases, targeting the right ads at the right users, making response mechanisms transparent and easy to use, and creating attractive reward schemes. Only then will they gain the trust of the end-user.

Companies (such as Gemalto) that provide mobile marketing solutions to mobile operators have developed expertise

55% of mobile marketing

consists of SMS messaging

>

“The days of texting users with unsolicited marketing messages are over”

job alert! click ok to see new vacancies

Page 21: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

21 www.gemalto.com

In one mobile campaign in India, a message promoting a sports news service was tested on similar target audiences using two delivery methods: a standard SMS and an interactive one. The response rate for the former, where the customer had to send a text message, was just 0.2%; for the latter, where the customer only had to press one button on their phone, it was 7.7% – a massive 38% higher.

in these areas, helping those operators to develop a long-term added-value dialogue with consumers and increase the ROI of mobile campaigns. When they’re done well, such campaigns can produce response rates as high as 30%.

Inventive techniquesOne thing is for sure: the days of texting users with unsolicited marketing messages are over. “As an industry, we started out by trying to apply the same online CRM and mass marketing techniques that had worked online,” MacDonald acknowledges, adding that this needed to change.

These days, marketers use subtle techniques that combine psychology and technology; inventive agencies create ways to make people want to opt in to receive marketing messages and offers, and the technology delivers them to the right people at the right time.

Another important trend is location-based advertising. Mobile operators can use GPS data or geo-fencing to pinpoint where a consumer is and, by combining this information with the qualified data from the opt-in database, send relevant promotions to the consumer that they can take advantage of at a nearby store or restaurant, for example.

Advertisements on products can also be used to entice users to opt in to receiving

marketing messages. For example, Procter & Gamble (P&G) used SMS messaging to persuade diaper buyers to stay loyal to its Pampers brand after market intelligence told it that new parents would start with Pampers and gradually switch to cheaper brands. So P&G invited people who bought its diapers to send an SMS that granted them free membership of a ‘New Mum’s Club’. Having won the parents’ confidence, P&G saw sales of Pampers rise by 30%.

The way aheadAlthough search and advertising have played a part in the rise of mobile marketing, they are ultimately overshadowed by the popularity of SMS messaging. However, this momentum can only be sustained if mobile operators observe best practice around permission marketing.

This means creating large and qualified opt-in databases, sending only relevant, solicited and targeted ads, and using response rates and customer satisfaction surveys to

inform marketing strategies. There are plenty of technologies on the market that can help operators put this strategy into action as efficiently as possible – some of them, like interactive SMS messaging, unique. The combination of properly implemented permission marketing,

cutting-edge technology and well thought-through consumer engagement

strategies is as close to a guaranteed formula for success as you can get.

Getinteractive!

thirsty? click ok to get 20% off our coffee

€1.75bnThe value of the global

mobile advertising market in 2009

Page 22: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

solutions_ Healthcare

22 The Review

solutions_ Healthcare

eHealth and safetyAuTHoR DAVE HOWELL

IllusTRATIon SONNET

As governments around the world seek to improve access to healthcare, they are increasingly looking to take advantage of electronic and mobile health schemes

Page 23: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

The European Commission (EC) plans to give all its citizens secure digital access to their health records by 2015. As a key component of the Digital Agenda for Europe, the infrastructure that will be needed should be built over the next few years, with an EC-funded pilot project (epSOS) already running. The aim is to empower patients by giving them more of an interactive role in their own healthcare.

Speaking at the eHealth 2010 Conference in Barcelona, EC Commissioner for Digital Agenda Neelie Kroes commented: “The latest research indicates that 29% of the EU’s population will be over 65 in 2050, and we are battling the deepest financial crisis in decades. Improving eHealth systems is one of the best ways in which we can address this challenge.”

However, the question remains whether an EU-wide platform could be developed that would be completely interoperable, and also about how secure such a system would actually be. “Securing access to digital health records has been ranked as an eHealth priority for several member states,” says an EU spokesperson. “The main issues to be

overcome to achieve this include gaining the trust and acceptance of citizens and health professionals to take up these services, which can represent something of a ‘culture change’ within traditional healthcare systems.

“There are also technical challenges in some member states, mainly linked to infrastructure and security issues,

although, as the technical solutions already exist, these are more straightforward to address. At EU level, the Commission is committed to supporting deployment projects, bringing together the ‘front runners’ and ‘beginners’ in this process so that lessons learned and best practices can be shared.”

What is clear is that integration will have to be incentivized to a degree to align some member states with the eHealth goals of larger EU countries. A high level of coordination between the development and deployment of digital platforms will be needed, as well as sufficient resources to ensure that the project

produces a system that all EU citizens can benefit from.At the moment, all eyes are on the pilot scheme. Its

success or failure will massively influence how integrated eHealthcare moves forward within the EU.

A digital agenda for healthcare in Europe

23 www.gemalto.com

supporting, enabling and creating sustainable healthcare solutions for the future.”

Highly confidentialThe government of Gabon in West Africa is one of many to have introduced an eHealth card scheme, as part of its commitment to expand social security cover to all its citizens. People can use the cards to gain access to care in hospitals, pharmacies and health clinics. The eHealth card therefore helps to reduce benefit fraud, provides healthcare to the right people and ensures that only official medical professionals can access patients’ data.

To guarantee that this data remains confidential, the scheme uses Gemalto’s Allynis Issuance personalization services and an identity data verification system, while the card itself is made of polycarbonate, a material that offers a high level of security and is resistant to extreme climatic conditions.

Gabon’s requirements highlight the fact that security is at the heart of eHealthcare. “More than almost any other type of information, patient data is highly confidential,” says Dr Peter Langkafel, Industry Director, Healthcare EMEA, at business software provider SAP. “Therefore, technology needs to ensure

that only people with authorization can see those elements of the data that they should see for their role. The technical cornerstone is a well thought-through concept that clearly defines roles and respective access rights.”

Thus eHealthcare and mHealthcare have developed around platforms such as Intel’s Mobile Clinical Assistant (built into the C5

Over the past two decades, eHealthcare systems – the umbrella term for

IT systems that store and share patient data – have become increasingly sophisticated. The challenge now facing every country that uses them is how to create an integrated system that is not only cost-effective, but also enables both patients and healthcare professionals to manage data securely. The remote management and monitoring of patients via smartphones, for instance, shows how virtual healthcare can be applied practically in even the most remote regions.

Indeed, the evolution of eHealthcare systems is no longer simply an IT issue; it’s a social imperative. Speaking at the Global E-Health Forum in October, Dr David Galler, Board Member of the New Zealand Commission for Quality and Safety in Healthcare, said: “eHealth will play a significant part in >

“More than almost any other type of information, patient data is highly confidential”

Page 24: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

solutions_ Healthcare

>

In many countries, the move to secure digital platforms has been driven by sheer demand. For example, France has a population of about 65 million, yet in June 2010 alone, French citizens made 95 million healthcare claims.

The system is able to cope with this level of activity thanks to the SESAM-Vitale scheme, first introduced in 1998, when a microprocessor social security card was issued to every family in France. This helped to simplify the administration process, slash paperwork costs – the scheme removed the need for 1 billion healthcare forms to be sent out in 2010, and 3 billion paper documents in all – and provide a faster, more efficient and secure way of submitting claims for reimbursement.

The SESAM-Vitale scheme has grown to include some 53 million patient cards and 600,000 health professional cards, not to mention 200,000 card readers and 20,000 terminals for updating cards. Today, 83% of France’s general practitioners and 96% of its pharmacists use the system.

Pharmacists are also at the center of the Dossier Pharmaceutique (DP for short: it translates into English as Pharmaceutical Dossier) scheme, a shared electronic medication record. When patients visit the pharmacy, their DP is accessed using their personal healthcare card and the pharmacist’s card. It shows all medication prescribed or purchased over the previous four months, and thus helps to avoid accidents linked to undesirable combinations of treatments. Since this free service was launched at the end of 2008, more than 10 million people have opted to create a DP.

A second version of the SESAM-Vitale card is now being rolled out with additional security features, including a digital photograph to combat fraud. The new cards can also carry lots more information, such as details of attending physicians, names of people to contact in an emergency and the holder’s wishes with regard to organ donation.

The French connection

The Review

tablet device), which offers clinicians hardware-based access to patient records, and Gemalto’s Sealys eHealth terminal, developed specially for the German market. Then there are smart card based systems for PHRs (Personal Health Records) that offer governments a way to track and implement healthcare claims.

Such systems are set to become commonplace for citizens around the world,

who will see practical benefits in the form of more efficient services, delivered at lower cost and more precisely targeted at their specific needs.

mHealth mattersThis is particularly true of the developing world, where governments are increasingly turning to digital technologies. Many countries that have seen the wider transformative effects of embracing the mobile

phone are now expanding their use of this platform to securely manage patient data, offer better patient care and vastly improve the infrastructure of their healthcare systems in general – mHealth schemes, in other words.

For example, the Mobile Technology for Community Health scheme in Ghana (covered in detail in the Spring 2010 issue of The Review) uses mobile phone messages to deliver relevant health information to pregnant women and automates the process of tracking patients who have received antenatal or postnatal care. Similarly innovative schemes are springing up all over the developing world.

It’s a similar story in the West, where the use of mobile devices – notably the latest smartphones, led by Apple’s iPhone – shows how remote management of patient care can be achieved. For example, in November 2010, Tieto Healthcare unveiled a new iPhone app called iM1-Mobile that gives medical professionals immediate access to important patient information and other key data within their hospital information system. It promises to help health providers to optimize processes, reduce waiting times, secure the flow of information and make high-quality decisions.

The importance of interoperabilityA recent report from consultants McKinsey & Company estimated the total value of the global mobile healthcare market in 2010 at US$60 billion; in the US alone it is estimated to be worth US$20 billion. However,

24

“Many of the basic applications and devices exist and are in use, but now we need to make them talk to each other”

Page 25: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

Machine-to-Machine (M2M) technology has an increasingly large role to play in eHealthcare. For example, Cinterion (the leading global supplier of wireless M2M modules) provides M2M technology to extend the reach of ambient assisted living homecare systems to any location where there is a mobile network. The inconspicuous, easy-to-use M2M telemonitoring devices use wireless sensors to remotely monitor and communicate patients’ vital health data, wherever they are. They can also automatically call for help, enabling the emergency services to react more quickly – and saving lives.

Remote monitoring

25 www.gemalto.com

implementing such schemes can still be problematic.

In the UN Foundation’s ‘mHealth for Development’ report, Dr Patricia Mechael, mHealth and Telemedicine Advisor to the Millennium Villages Project of the Earth Institute at Columbia University, writes: “With eHealth and mHealth, an ecosystem approach is recommended. Many of the basic applications and devices exist and are in use, but now we need to make them talk to each other in a way that yields strategic benefits.”

Interoperability is clearly a major hurdle. SAP’s Peter Langkafel says: “There are three main barriers, starting with concerns about data security and individual rights of data.

“The second is transparency. Not everyone is interested in being transparent, since all potential mistakes and financial effects would be transparent, too. Although this is a huge change in terms of improving quality and increasing efficiency, some players see that more like a threat.

“The third barrier is standardization. Doctors do not like to be ‘standardized’ – their role perception is that they’re more of an artist,

not a content owner of a specific process part. But standardization can mean getting rid of chaos, and having even more freedom and time for patients, since time and energy aren’t wasted on unnecessary tasks.”

Islands of informationDespite these concerns, the mHealth ecosystem is expanding. As with eHealthcare, the current challenge is to ensure that patients’ information is secure, yet can be accessed by a wide range of clinical professionals who may need to view it.

What mustn’t happen is for a ‘walled garden’ approach to prevail. This would deliver a fragmented system that would be neither transparent nor interoperable. Fortunately, the EU is moving towards a fully integrated system (see panel, p9), with many countries in the West also moving forward with their own eHealth and mHealth initiatives.

The need for highly integrated digital platforms that can not only support each healthcare worker, no matter their location, but also empower citizens to take control of their healthcare records, is driving the many eHealth and mHealth systems that are either in development or being rolled out at the moment. However, as a result of the paramount need to ensure the security of data on these digital platforms, this development is likely to be an evolution rather than a revolution.

US$60bnThe estimated total value of the global mobile healthcare market in 2010

The SESAM-Vitale scheme in France has been a big success

Page 26: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

26 The Review

Page 27: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

www.gemalto.com 27

No more standing in lineIn the not too distant past, people who wanted to transfer money from one account to another had to stand in line at a branch of their bank to sign the order. Now eBanking is finally helping to eliminate the wait, while ensuring high levels of security. The customer gets the convenience of being able to do their banking wherever and whenever they want: the bank saves money on staff and branches, and has the chance to increase customer loyalty and spending if they can find the the right blend of innovative – and trusted – eServices.

The technology

Gemalto’s Ezio Suite offers the latest in eBanking technology, enabling banks to expand online while reducing costs. It brings together a unique authentication server, plug-in modules and a range of authentication devices to create a flexible, future-proof system that lets banks mix and match authentication devices, standards and algorithms.

The big picture_ eBanking

Imag

e: G

etty

Page 28: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

Xxxx_ Xxxxx

>

28 The Review

Wired and wireless networks are interconnected

using the internet, sensors are embedded in physical objects, and machines are communicating with other machines autonomously, transmitting real-time data that is processed and shared instantaneously, without any human intervention. This is the

essence of Machine-to-Machine communication (M2M), an intelligent solution that connects people and devices in ways that are sometimes unexpected, often brilliant and always supremely efficient.

“M2M communication is all about things being connected to each other to improve logistics and manage the processes of work more efficiently than other means would normally allow you to do,” explains Norbert Muhrer, CEO of Cinterion, the world’s leading supplier of wireless modules for the cellular M2M market.

A recent report by management consulting firm McKinsey* discusses how the predictable pathways of information are changing, with the physical world itself becoming a type of information system – a phenomenon often referred to as the ‘Internet of Things’ (IoT for short) or

The use of M2M communication is growing, delivering a wide range of benefits to consumers and enterprises alike. But this isn’t just about another gadget – M2M has the potential to change the relationship between man and technology

Innovation_ M2M

AuThor TAMSIN OxFORD

illusTrATions VIkTOR kOeN

Let machines do the talking

‘Internet of the Future’. The authors see two broad categories emerging: ‘Information and Analysis’ and ‘Automation and Control’. In the former, the network linking of data from products, or the environment, will enhance decision-making and analysis. In the latter, the information collected via the IoT will feed back to modify processes, thereby raising productivity and machine autonomy.

Rapid transformationThe IoT has undergone a rapid transformation over the past year thanks to the adherence of chip manufacturing to Moore’s Law (which says that the number of transistors that can be placed on an integrated circuit doubles roughly every two years), the evolution of connectivity and the growth of the next generation of internet technologies.

Page 29: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

Xxxx_ Xxxxx

M2M (Machine-to-Machine) technology enables communication between machines for applications

such as smart metering, remote maintenance, mobile health, automotive and fleet management, eToll

systems, alarm and security systems, point of sale systems, industrial PDAs, routers and gateways,

tracking and tracing devices, and many more.

An M2M module effectively has the functionality ofa mobile phone, although it has none of the normal appearance (ie it has no display, keypad or battery).

A MIM (Machine Identification Module) is the equivalent of a SIM (Subscriber Identification Module),

with specific features such that it can be used in machines and enable authentication.

M2M and MIM

>

29 www.gemalto.com

Page 30: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

The Review

“M2M is still a very young segment, but it is growing continuously at rates of about 20-25% per year,” says Muhrer. “The market consists of 50 billion machines and there are nearly 7 billion people on the planet, so we are looking at a factor of six or seven in terms of connectible machines. The penetration rate is currently only 1%, and in the mobile phone territory we have penetration rates of about 75% – so there is a huge potential in the market that has hardly been tapped.”

Putting this into financial terms, ABI Research has forecast (in a report published in October 2010) that the global M2M module market is set to reach US$3.8 billion in 2015, with more than 180 million cellular M2M connections active worldwide by 2013.

David Birch, a director of IT management consultancy Consult Hyperion, says: “We used to think about computers getting more and more powerful, but now it’s all about chips becoming more affordable.

“Then you have the connection technologies, 3G and 4G. They’re also coming to an interesting point because, quite soon, everything will be connected with everything else, which is the anchoring layer of the Internet of Things.”

However, Muhrer is not convinced that 4G will have much impact on the M2M sphere in the immediate future. He says: “The bulk of machines don’t demand huge bandwidth

and, because carriers will initially only roll out 4G in urban areas with high customer usage, it won’t be enough, because coverage is more important than bandwidth for M2M.”

What else is needed?Nevertheless, it’s clear that we are moving towards a world in which everything will be interconnected at high speed, and in which more and more objects will authenticate themselves to the network. The MIM (Machine Identification Module – see panel, p29) is a core element of this business, because it guarantees secured authentication of the devices.

As such, the industry should also be prepared to provide additional flexibility on the provisioning side to match M2M use case constraints; for example, the life of the devices in automotive or metering can typically span more than 20 years. Most of the major stakeholders in the industry (notably the GSMA, which made some significant announcements on this topic late last year) are currently working on defining a suitable solution for the M2M world.

What is clear is that any solution should leverage the unique security features of the MIM, as an item of secured independent hardware that enables the authentication of objects on the network.

What’s more, increases in data storage and computing

power have made it far more feasible to analyze and interpret the sheer volume of real-time data transmitted from an interconnected world. This is essential if the IoT is to have any real meaning. Data taken from analogue actions has to be accurately translated into digital content that will deliver services in real time.

A wealth of applicationsSo what will these services look like? In the Winter 2009 issue of The Review we looked at how M2M technology was already being implemented in transport and telematics, while the retail and leisure industries were showing an increasing interest. Today the market has moved on, with new applications being introduced and implemented on a rapid scale.

Muhrer believes that the next few years will see substantial government-mandated projects aimed at reducing the environmental impact of industry, such as smart metering and meter reading. “eHealth will also take off, because these systems need to reduce costs where they can,” he says. “With a lot of outpatient monitoring, M2M can really be a catalyst.

“Another intriguing segment is electric cars. An infrastructure needs to be put in place so that people can get to where they need to go, and to manage charging cars at peak times, or preferably at low-load times for the power grid, ie during the night. Here you will see a convergence between the power industry and the electric vehicle industry, and we believe that M2M will solve many of the problems there.”

With a growing elderly population, home automation will also become increasingly popular. “I want to know how my grandparents are doing, especially if they live alone, and I want to be notified

30

“The bulk of M2M applications and benefits will go towards cutting costs and improving efficiency in industry”

>

Innovation_ M2M

Page 31: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

31 www.gemalto.com

immediately if there is a problem,” says Muhrer.

He adds that the visible impact of M2M, as far as most people are concerned, will be in intelligent traffic management, as traffic flows are controlled and managed more efficiently. However, the bulk of M2M applications and benefits will go towards cutting costs and improving efficiency in industry.

“M2M will increase the competence and competitiveness of enterprises, helping them to deliver distinctive factors so that they can distinguish themselves in their competitive market environments,” he concludes.

The human factorAs machines become more intelligent, it’s worth asking how M2M will affect our lives and wellbeing, and what are the implications for our future.

“Objects are going to form their own independent social networks that are so reliable that we are released from most of our machine-operating duties and get to be human again,” explains David Orban, Director of Humanity+, a non-governmental organization that advocates the ethical use of emerging technologies to enhance human capacities. “However, it is crucial that we take the human element into account while developing the IoT. This includes things like consumer-friendly interfaces, an autonomous way of working that doesn’t overwhelm the user with too much data, and ensuring that issues like security and privacy are dealt with openly.”

But this idealistic view of a liberated future for humanity is balanced by darker concerns, as voiced by Rob van Kranenburg, founder of Council, an Internet of Things think tank. “We have to picture a situation where humans are no longer fully in control,” he says. “In the world of M2M communication, the protocols and standards that are being set up to run these

systems now will become the political reality of the future.”

The secure machineAny discussion of the the potential of the IoT must include security, of course. It is essential to ensure that consumer privacy is safeguarded and that business data is reliable, confidential and secure.

“We need to move a layer further than GSM encryption

M2M offers more than just a seamless future of interoperability and connectivity; there is also an environmental dividend. “M2M cuts out a lot of barriers that have to be physically or manually overcome at the moment,” explains Cinterion CEO Norbert Muhrer. “A great example is the way vending machines in Japan know exactly what their inventory and cash levels are and what their status is – so when maintenance people go out, they can take exactly the right inventory and tools. No wasted trips – the costs go down, and the environmental impact is minimized as well.”

Dr Thorsten Staake, Research Director of the Bits to Energy Lab, a joint research initiative of the ETH zurich and the University of St Gallen in

Switzerland, adds that “as technology becomes smaller and cheaper, it can be used in a wider range of applications, such as home automation and process control in industry”.

So how does Staake believe M2M will benefit the environment in the future? “Smart feedback devices will motivate us to make greener decisions when purchasing goods and using energy,” he says. “Smart consumption feedback devices for electricity, water, gas and so forth will make it into our daily lives over the next decade. We will also see some interesting borrowings from marketing and behavioral science that will make feedback information easier to understand and more fun to use.”

The green machine

and say that we will encrypt the data as soon as it is on the device or stored on the server,” says Muhrer. “If we expand data security, we will improve the trust level of the general user population.”

The European Commission is already working on the issues relating to security and privacy within the IoT, and its Internet Engineering Task Force is working on a standard for

The predicted value of the global M2M module market in 2015

US$3.8bn

secure communication between objects in the IoT – an important step towards a universally accepted security infrastructure for M2M communications.

But securing the IoT clearly involves more than just networks and data; it also encompasses the human element – ensuring the privacy of the people who populate it. Fortunately, we find ourselves at a unique point in time when the industry can provide security and privacy solutions from the beginning, rather than as knee-jerk reactions.

*McKinsey Quarterly 2010, ‘Internet of Things’ by Michael Chui, Markus Löffler and Roger Roberts

Page 32: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

32 The Review

statistics from the digital world

Global snapshot

20%The Office of Utilities Regulation in Jamaica says the island’s three major mobile networks have a total of 2.88 million subscribers – a penetration rate of 107.87%. With customer usage of online and telephone banking in Jamaica expected to reach 20% by 2015, experts are predicting that use of bank branch services will fall from the current 79% to 61% over the same period. Source: www.jamaica-gleaner.com

85%According to the latest Unisys Security Index, 85% of people in

Brazil are seriously concerned about other people obtaining and using their credit or debit card details. Approximately half of the Brazilians interviewed said that they were “extremely” or “very” worried about the safety of internet and mobile phone use when Brazil hosts the 2014 football World Cup and the 2016 Olympics.

Source: www.unisyssecurityindex.com

US$1.4 billionPurchases attributed to mobile online shopping (excluding travel) in the US grew from US$396.3 million in 2008 to US$1.4 billion in 2009. ABI Research estimates that in 2010, this figure had more than doubled again, to total more than US$3.4 billion by year’s end. Source: www.abiresearch.com

Jenny Matthews/Panos Pictures

Page 33: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

www.gemalto.com 33

4 million More than 4 million people in Australia

are already using tap-and-go (contactless) payment cards, with that figure expected to

more than double in 2011. About 35,000 retail outlets now accept tap-and-go cards, and that

number is expected to triple in the coming year.Source: www.mozo.com.au

£89 million In a new charitable giving scheme in the UK, shoppers paying by chip and PIN card will be given the option of rounding up the cost of their purchases to the nearest pound; the spare pennies will be donated to a good cause. If each UK resident gave just 8p a week under this scheme, it would generate £89 million for charity in a single year.Source: www.telegraph.co.uk

12,000The Nigerian Economic and Financial Crimes Commission (EFCC) has intercepted 12,000 scam emails and recovered more than US$170 million from cybercriminals in the past three years. Since it was established in 2004, the EFCC has secured more than 300 convictions of cybercriminals.Source: www.itnewsafrica.com

Jaco

b Si

lber

berg

/Pan

os P

ictu

res

10.8%The smart card sector in the Middle East North Africa region is predicted to grow exponentially over the next three years, according to Frost & Sullivan. Smart card revenue is expected to reach US$328.5 million in 2014, compared with US$229.3 million in 2009 – a compound annual growth rate of 10.8%. Source: www.squidcard.com

The Russian government plans to order ministries and state companies to use more of their procurement budgets to buy products that qualify as ‘innovative’ and are made in Russia. State procurement orders total about US$133 billion a year, but only 15% of them currently go to Russian technology companies.Source: www.nytimes.com

15%

Page 34: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

34 The Review

Innovation_ eGovernment

Why eID is big in BelgiumDigital ID has a come a long way in the

past decade. Several European countries have their own schemes, but one in particular stands out. Belgium started

work on electronic ID (eID) more than 10 years ago, and it is now mandatory for every citizen over 15 to carry an eID card with them.

Belgium’s Federal Public Service Information and Communication Technology agency (FEDICT) has made the BelPIC (Belgian Personal Identity Card) technical framework as open as possible, to ensure that third-party organizations can use the card as a highly secure authentication mechanism – one notable example is eBay. Add to this the fact that BelPIC is compliant with the latest standards, such as the European directive on digital signature 1999/93/CE, and it’s no surprise that there are now 8.2 million Belgian eID cards in circulation.

Citizens can use their eID for secure access to a range of eGovernment services, such as managing their tax and certifying births, as an alternative to a passport when traveling within the Schengen area, and as a binding instrument for signing legal papers. They can also use it for more than 700 online applications, from paying bills to signing letters, PDFs and contracts using the Certipost facility. As a result, eID has become a key feature of most Belgians’ personal and business lives.

opening doorsFrank Leyman, FEDICT’s Manager of International Relations, puts the success of eID in context by

Belgium’s national eID scheme is a model for other countries to follow, bringing a wide range of eGovernment services to citizens. So what is the secret of its success?

AuTHoR STEVE GOLD

frank leyman

Ronny Depoortere

Page 35: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

35 www.gemalto.com

Why eID is big in Belgium

pointing out that Belgium has had a national ID program for more than 40 years. It’s against this backdrop that eID can be viewed as a key to an electronic door. “Belgium is a small country, but we carry our weight in terms of technology,” he says.

The technology in the Belgian eID card is impressive. The latest cards feature three 1024-bit RSA private signing keys: one to authenticate the citizen to any open standard interface system, one for non-repudiation signatures, and one to identify the card itself to the government. For most applications, the card only allows access to its private keys once the owner has entered a PIN using a suitable card reader interface. In order to deter counterfeiters, the manufacture of the card body also makes use of the latest security technologies, including rainbow, ultraviolet and guilloché printing, changeable laser images, optical variable ink, and relief and laser engraving.

In one sense, this is irrelevant, as the government promotes eID as a service, rather than a physical token – a major difference between this and other smart card platforms. “There are no apps on the card,” Leyman explains. “Everything is online. FEDICT’s purpose is to allow the service to open more doors and, in the longer term, to promote eID as a single identity system for almost all online and electronic applications.”

The government issues four forms of national ID card – eID, kids’ ID, European resident cards and non-European resident cards – but it is hoped that a universal eID will eventually fulfill all four roles.

Widely acceptedRonny Depoortere, Senior Vice President at Zetes (the prime contractor for the eID project, alongside Gemalto), says that the key to the card’s success has been its ability to interface with a variety of third-party IT platforms, thanks to its open architecture. For example, people can now use it to buy tickets for soccer matches and rail journeys; the tickets are then loaded onto the card itself. Further applications are in the pipeline.

“The big problems for any ticket issuer are security and costs,” Depoortere explains. “eID is highly secure and its cost to implement is a lot less than competing systems, as its universal nature means that the organization doesn’t have to employ its own token-based system.”

The main exception is the banking sector, which remains wary. Depoortere suggests this is simply because it doesn’t own the platform and Leyman

agrees, saying: “The more government involvement there is, the less welcome the platform is to the banks.” Outside of banking, however, eID take-up has been almost universal. For example, just 20% of adults still own a paper passport.

Depoortere adds that the next move will be to add biometrics to the platform. The government is driving this, but, once the feature is added, he expects a number of third-party organizations to tap into the technology.

The €64,000 question is whether the success of the Belgian eID program could be replicated across Europe. The answer is, yes, it probably could. As we reported in the Autumn 2010 edition of The Review, FEDICT is a key member of the STORK consortium, which aims to establish a European eID interoperability platform that will allow citizens to access online applications across borders using their national ID. The experience of 10 years of eID and digital signature in Belgium will doubtless prove invaluable as similar schemes are developed across the continent.

8.2mThe number of eID cards in circulation in Belgium, which has a total population of just under 11m

Belgium’s FEDICT is part of the EU-funded STORK consortium, which is developing the technology to allow the various eID systems in all the EU countries to work together

“The key to the card’s success has been its ability to interface with a variety of third-party IT platforms”

The pragmatic approachDespite being a small country, Belgium is arguably one of the most advanced in Europe in terms of digital technology. In other countries, the introduction of new technology is often delayed by long periods of consultation; the Belgian government simply gets on with it.

This pragmatism can be attributed to the diversity of Belgian politics. With a split between Dutch and French speakers, plus a German-speaking minority, there is a melting pot of cultures and languages that can only work if all concerned use their common sense.

This approach allows Belgium’s leaders to embrace technology without fear of reprisals at the ballot box. Couple this with a natural national modesty – which translates to less posturing by politicians than in other countries – and you have the perfect environment in which to implement cutting-edge IT for the benefit of the population.

Page 36: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

36 The Review

news

In brief

Gemalto and Verifone are working together to introduce EMV smart card solutions in the US, where banks, retailers and card networks are increasingly acknowledging chip card and contactless technologies as core components of a comprehensive security infrastructure. The companies announced a strategic partnership in October 2010; combining their expertise at both issuing and accepting smart cards will provide a ready infrastructure as the US moves towards the adoption of EMV.

It was an award-laden end to 2010 for Gemalto (see the stories below and on the facing page), and the company was honored to receive the Best Smart Card Solution award at the Government Security News Homeland Security Awards galain Washington, DC. The award was for the Personal Identity Verification credential, which allows US government agencies to link existing proximity-based physical access control systems and new FIPS 201-compliant systems. As of 2009, Gemalto had provided more than 25 million microprocessor-based secure personal devices to the federal government.

A smart partnership

Homeland honor

Leaders in Latin America

An industry first in Canada

Security for trading placesProtiva One4all, which Gemalto launched in December 2010, is a strong authentication solution specifically designed for busy trading floors where workstations have multiple trading terminals. It enables a trader to log on to several terminals at once using two-factor authentication; this ability to create multiple secure log-ons with a single action can save hundreds of valuable minutes over the course of a trading day. All events, such as log-on, log-off, lock and unlock, can be replicated across the ‘slave’ terminals, increasing efficiency and giving banks and brokers alike unrivaled security and tracking.

In November, leading business research and consulting firm Frost & Sullivan gave its 2010 Latin America Competitive Strategy Leadership Award to Gemalto. Frost & Sullivan used several criteria to benchmark Gemalto’s performance against key competitors – leverage of competitive intelligence, execution of competitive strategy, impact on market share, competitive brand positioning and impact on customer satisfaction/value – and scored the company highly on all of them. “We found Gemalto to have a proven ability to deliver excellence and best practice as a leader in digital security for Latin America,” says Frost & Sullivan Industry Manager Marcelo Kawanami.

As Canada continues its migration to EMV banking cards, Gemalto’s Optelio dual interface debit card has become the first to be certified as compliant with the Interac Flash specification. Interac Flash increases the functionality of Interac-branded debit cards by using dual interface microprocessors. This means that a cardholder can carry out a point-of-sale debit transaction using either the contact or contactless feature of the card, for added security and convenience.

north and south America

Qila

i She

n/Pa

nos

Pic

ture

s

Page 37: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

37 www.gemalto.com

Asia and oceania

Trials of Near-Field Communication (NFC) technology have been increasing in number and frequency over the past few years, and the latest started in Singapore in December. Up to 1,000 customers of DBS Bank who subscribe to StarHub’s mobile phone services are taking part in the trial. The project involves adding a Gemalto Upteq N-Flex device to the phone’s SIM card, turning a conventional handset into an NFC-enabled phone without any change to the device itself. Once this is done, consumers can make payments with their mobile handset at outlets that accept MasterCard PayPass or the Ez-link card, as well as on public transportation.

NFC trial in Singapore

Trusted, secure… and award-winningThe CATRENE Trusted Secure Computing project won the 2010 Innovation award at the Nanoelectronics Forum in Madrid. The project, led by Gemalto and involving a consortium of 15 members, explored possible extensions of the Trusted Secure Computing concept – technologies that, in the not too distant future, will be the cornerstone of cloud computing security. For organizations, this means ensuring that their internal applications are running on trusted servers and used by authorized employees, while consumers will also be able to verify the trust level of any machine that they use to access online services, whether it’s a PC, a mobile terminal or a TV set.

europe and Africa

4 millionThe number of ePassports that Gemalto has deployed in Denmark since 2006. Now the Danish State Police has renewed its agreement with Gemalto for a complete Sealys ePassport production and issuance service for five years, with an option for a further five. At the heart of the contract are Gemalto’s Allynis Issuance services, which include ePassport personalization and delivery of the finished passports to citizens.

The Republic of Benin is staging presidential elections in March 2011. Considered by some to be a model democracy in a continent where that is not always the case, the West African country is hoping to reinforce this reputation by using Gemalto’s Coesys Enrolment solution to manage the secure biometric registration of more than six million voters. To achieve this, Gemalto has delivered more than 3,200 mobile biometric enrollment stations in just two months, along with the related software that enables officials to capture citizens’ demographic data, fingerprints and digital photographs in the field. Gemalto is also providing the software for national data consolidation, training services, technical assistance and fulfillment.

Biometric voter enrollment in Benin

20 millionThe number of online banking customers around the world who use Gemalto’s solutions

Page 38: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

38 The Review

Digital lives_ Marian Rejewski

AuThOR ELEANOR LEE

ILLuSTRATION ILIKETODRAWTHINGS

A secret hero

After World War II, Winston Churchill reportedly told King George VI that “it was thanks to Ultra that we won.” The story of Ultra, the intelligence that the Allies gained by deciphering encrypted enemy messages, was kept secret from the public until 1974, and the men and women who were responsible for it went unacknowledged for decades.

Even now, Marian Rejewski is a little-known figure. Born in the Polish city of Bydgoszcz in 1905, he was 24 when he graduated from Poznan University with a master’s degree in mathematics. He was already a budding cryptologist, attending a secret course organized by the Biuro Szyfrów (Polish Cipher Bureau) while he worked on his thesis.

Thanks to his mathematical abilities and his fluency in German, Rejewski was one of the few students able to keep up with the course, soon breaking codes the Germans had declared “unsolvable”. In 1932, the Biuro hired him to work on cracking Enigma, the electro-mechanical rotor machine that the Germans

used to send and receive encrypted messages.

Wrestling with the complexities of Enigma was a task that seemed made for Rejewski. He used group theory to deduce a set of equations that came close to revealing Enigma’s encryption technique, but he still needed information about the wiring of the rotors that scrambled the input from the keyboard. Luckily, a spy who worked at the German Armed Forces’ cryptographic offices had been feeding the French material about the wiring of Enigma for several years. No one had been able to do anything with this material until, in December 1932, it passed into Rejewski’s hands, enabling him to complete his equations.

The next task was to figure out how Enigma’s keys were connected to its entry drum. Rejewski intuitively guessed that the obvious answer might in fact be the correct one: they were wired alphabetically. All he had to do now was work out methods to find the daily keys the Germans used. By 1935, the Biuro had developed a

“Only in the early 1970s did Rejewski finally have the opportunity to tell the truth about Ultra’s origins”

Polish mathematician Marian Rejewski was the first to crack the Enigma code, but it was many years before his contribution to the war effort was acknowledged

“cyclometer” – a catalog of permutations for the 105,456 possible Enigma settings. By 1938 they could read the majority of Enigma intercepts.

However, the Polish didn’t have the resources to keep up with the rapid evolution of Enigma encryption, so, just as war broke out, they shared their methods with the British and French intelligence services. The breakthroughs made by Rejewski and his Polish colleagues were indispensable as cryptographic analysis started in earnest at Bletchley Park, Britain’s main codebreaking center.

Along with two of his colleagues, Rejewski was evacuated to Romania when the Germans invaded and spent the war in France and then the UK, decrypting German messages. However, he never worked on Enigma again, and because of the strict secrecy that was essential in the codebreakers’ world, most of those who did were unaware of his contribution.

It would be several decades before he finally received the credit he was due. Returning to Poland after the war, he worked as a sales director at a cable manufacturing company, and later as an accountant at a provincial association of labor

cooperatives. Only in the early 1970s, when the story of Ultra finally began to seep out, did he have the opportunity to tell the truth about its origins. In 1980 he was awarded the Officer’s Cross of the Order of Polonia Restituta, but he died 18 months later, aged 74, and most of his honors were posthumous. There are now memorials to him and his colleagues at Bletchley Park and at the Polish Embassy in London, in Uzès in France and in Poznan, while a street and a school in Bydgoszcz are named after him.

Despite his place in history, Rejewski’s influence on modern cryptography is less certain. At the time, his use of mathematics – especially group theory – was a major breakthrough for cryptographic analysis, and his cracking of the Enigma code paved the way for mathematicians such as Alan Turing to develop new algorithms that could be deployed on more advanced encryption machines.

However, with computing on the rise from the late 1940s and information theory being “founded” by Claude Shannon at the University of Michigan in 1948, cryptography was about to be absorbed into – and transformed by – the digital era.

Page 39: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,
Page 40: Winter 2011 Revıew the - Gemalto · Revıew the Winter 2011 Get the message ... 2 The Review T ... for cracking the Enigma code As well as editing mobileb2b.co.uk,

Revıewthe

Winter 2011

Get the messageThe power of mobile marketing and advertising

The latest in electronicand mobile healthcare

Mobile innovation in Asia

Why Belgium leadsthe way in eID

How machinesstarted talking: the rise of M2M

hungry? you’re only 100m from tasty pizza. click ok to get a 15% discount today