SlideShare a Scribd company logo
1 of 17
Download to read offline
EXTERNAL USE
CHRISTOPH ZWAHLEN
JUNE 15TH, 2016
PRESENT IMPROVED - FUTURE
INSIDE
STREAMLINED USER
MANAGEMENT FOR MULTI-
VENDOR INSTALLATIONS
• Multi-vendor systems are common in IT
environments in users daily life
• Each user has multiple log-in credentials for
individual service reducing the user
convenience and the accessibility of services
• Significant increase of system maintenance
effort to manage user credentials across
multiple services
• Identity Access Management (IAM) offering
harmonized log-in solutions
Log-in Credentials
Multi-vendor solutions in IT systems
June 15, 20162.
Agenda
1. Drivers for multi-vendor systems
2. Card Identity Management – optimized for multi-
vendor systems
3. Practical implementation
• MIFARE DESFire EV2
Christoph Zwahlen
Marketing Manager
Access Management
• Flexibility of contactless smart cards have
extended the usage into more applications
• Optimized business processes for improved efficiency
• Increased comfort and availability through automation of
services
• Controllability and traceability and reduced cost of service
ownership
• New use cases introduce new solution specific
data structures on contactless smart card
• New application specific data structures introducing new
identification data structure
• Increased efforts in centralized credential management
Multi-application contactless smart cards
Flexible solutions maximizing organizational benefits
June 15, 20164.
• Organizations are looking for best solutions fitting
the requirements of new use cases
• Organizational benefits driving solutions selection
• Cost of system ownership
• Multi-application solutions enable simplified
operation of multi-vendor systems
• Extension of application coverage e.g. offline locks replacing
mechanical keys
• Integration of new use cases, e.g. follow-me printing
• Manageability of growing systems for sustainable
solutions
• Maintainability of system and individual applications
• High availability, controllability and traceability of applications
Multi-vendor systems
Standard ecosystem in growing technology adoption
June 15, 20165.
Use Cases: Multi-national company
Centralized credential management without limiting local autonomy
June 15, 20166.
• Centralized management of access rights
ensuring availability controllability and
traceability
• E.g. Centralized blocking of credentials
• Global credential compatible with local
requirements
• Local regulations
• Site specific security demands
• Support of individual local solutions
• Flexible system extendibility and maintainability
• Enable site specific extension of use cases
Multi-vendor vendor systems
June 15, 20167.
Contactless Smart Card
• High acceptance in
various applications
• User convenience
• Fast roll-out of new
applications
Secure Multi-application
• Adaptable to organiza-
tional changes
• Simple and secure
integration into one
card
Manageable solutions
• Central user and right
management
• Cross application
traceability and
controllability
Shared platform Adaptable solutions Maintainability
• Secure multi-application ensure
protection of individual applications
• Only dedicated devices are enabled to access
specific application data
• Usage of harmonized card ID not
natively supported
• Common solutions
• Switching of applications resulting in
increased transaction times
• Harmonized application data structure limiting
benefits of individual applications
• Duplication of user id in each application
increasing system maintenance efforts
Challenges of multi-vendor systems
June 15, 20168.
Root directory
PICC Level
User ID1
Standard file
Application 1
Application ID
User ID2
Standard file
Application 2
Application ID
• Workflow enabling harmonized user management
throughout multiple applications and services on
card
• Compliance with organizational security and privacy
requirements
• Ensuring centralized controllability and traceability
• Single secure user identification accessible from
different applications
• Simplified multi-vendor solutions
• Resource efficient and convenient workflows
• Ensuring efficient long-term maintenance of multi-
application systems
Card Identity Management
Cross application user management
June 15, 20169.
MIFARE DESFire® generation benefits
MIFARE DESFire® EV2
June 15, 201610.
2002
MIFARE DESFire
2008
MIFARE DESFire EV1
2015
MIFARE DESFire EV1 256B
2016
MIFARE DESFire EV2
MIFARE
DESFire EV1
MIFARE
DESFire EV2
ISO/IEC 14443 A 1-4  
ISO/IEC 7816-4 support extended extended
EEPROM data memory 2/4/8KB 2/4/8KB
Flexible file structure  
NFC Forum Tag Type 4  
Secure, high-speed cmd  
Unique ID 7BUID or 4B RID 7BUID or 4B RID
Number of applications 28 unlimited
Number of files per app 32 32
High data rates support up to 848 Kbit/s up to 848 Kbit/s
Crypto algorithms support
DES/2K3DES/
3K3DES/AES
DES/2K3DES/
3K3DES/AES
CC certification (HW + SW) EAL 4+ EAL 5+
MIsmartApp feature - 
Transaction MAC per app - 
Multiple keysets per app - Up to 16 keysets
Multiple file access rights - Up to 8 keys
Inter-app files sharing - 
Virtual Card Architecture - 
Proximity Check - 
Delivery types
Wafer, MOA4 &
MOA8
Wafer, MOA4 &
MOB6
• Improving maintainability and flexibility of multi-
vendor installations
• Enabling centralized credential management for
efficient local credential use cases
• Centralized controllability and traceability
• Simplified cross-site usage
• Optimized overall system maintenance
• Support of individual use cases for maximal
solution benefits
• Flexible introduction of new local applications
• Maximize benefits through usage of vendor specific data
structure
Inter-app files sharing
Enhanced card identity management capabilities in MIFARE DESFire EV2
June 15, 201611.
Inter-app files sharing – example employee card
Employee Card
(MIFARE DESFire EV2)
Upgrade
Employee Card
(MIFARE DESFire EV1)
Site A Site B Global ID Site BSite A
New application in Site A is
available to all employees
• Verify backwards compatibility of MIFARE DESFire EV2
in existing applications
• Integration of Inter-app file sharing
• To card management workflows
• To infrastructure components
• Integration of interfaces to centralized card identity
management solutions
• E.g. blocking of credentials in system, log-file reporting
• Roll-out of flexible solution for multi-vendor environment
Inter-app files sharing – Integration
Enabling smart solutions
June 15, 201613.
Thank you
Visit us at http://MIFARE.net
Follow us:
https://twitter.com/nxp_mifare https://at.linkedin.com/in/nxpmifarewww.youtube.com/user/nxpsemiconductorshttp://blog.nxp.com/ https://www.facebook.com/nxpsemi
Q&A
Webinar Series
Outlook
Date Title
May 24th 2016 MIFARE Innovation Roadmap – present improved, future inside
June 1st 2016 How to protect contactless systems today and tomorrow
June 8th 2016 Enhanced user experience through active application management
June 15th 2016 Streamlined user management for multi-vendor installations
June 22nd 2016 Secure closed loop payments in an open environment
June 29th 2016 Introduce the future in your today’s system – how to ensure smooth system upgrades
July 6th 2016 Added value to card based environments through NFC and cloud – when IoT
becomes reality
July 13th 2016 Complement use cases with mobiles and wearables
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations

More Related Content

What's hot

NFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEBNFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEBRichard Schmidmaier
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderBitdefender Enterprise
 
Fido Security Key
Fido Security KeyFido Security Key
Fido Security KeyGoTrust ID
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationHans Klos
 
Securing Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUESecuring Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUEWSO2
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3princescorpio
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsNok Nok Labs, Inc
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture Block Armour
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTTransUnion
 
Mobile payments and PCI DSS
Mobile payments and PCI DSSMobile payments and PCI DSS
Mobile payments and PCI DSSManish Mahapatra
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Block Armour
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO Alliance
 
Flak general v2 5
Flak general v2 5Flak general v2 5
Flak general v2 5digiflak
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
RSA Secur id for windows
RSA Secur id for windowsRSA Secur id for windows
RSA Secur id for windowsarpit06055
 
Secure Element Solutions
Secure Element SolutionsSecure Element Solutions
Secure Element SolutionsUgo Chirico
 
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...Block Armour
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Alliance
 

What's hot (20)

NFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEBNFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEB
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
 
Fido Security Key
Fido Security KeyFido Security Key
Fido Security Key
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
Securing Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUESecuring Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUE
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
 
Beam datasheet final 7 28-12
Beam datasheet final 7 28-12Beam datasheet final 7 28-12
Beam datasheet final 7 28-12
 
Mobile payments and PCI DSS
Mobile payments and PCI DSSMobile payments and PCI DSS
Mobile payments and PCI DSS
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
 
Flak general v2 5
Flak general v2 5Flak general v2 5
Flak general v2 5
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
RSA Secur id for windows
RSA Secur id for windowsRSA Secur id for windows
RSA Secur id for windows
 
Secure Element Solutions
Secure Element SolutionsSecure Element Solutions
Secure Element Solutions
 
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 

Viewers also liked

Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/PerspectiveContactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/PerspectiveBurak Ilgıcıoğlu
 
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...NXP MIFARE Team
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryErfan Moradian
 
NXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
NXP MIFARE Webinar: Complement Use Cases With Mobiles And WearablesNXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
NXP MIFARE Webinar: Complement Use Cases With Mobiles And WearablesNXP MIFARE Team
 
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Team
 
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Team
 
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Team
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
NfC Forum Mobile NfC Ecosystem White Paper
NfC Forum Mobile NfC Ecosystem White PaperNfC Forum Mobile NfC Ecosystem White Paper
NfC Forum Mobile NfC Ecosystem White PaperTmac77
 
Near Field Communication on iPhone with iCarte
Near Field Communication on iPhone with iCarteNear Field Communication on iPhone with iCarte
Near Field Communication on iPhone with iCarteAndrew Roughan
 
Mobile-based NFC fare collection
Mobile-based NFC fare collectionMobile-based NFC fare collection
Mobile-based NFC fare collectionnnaveiras
 
ACR128 product presentation by Advanced Card Systems Ltd.
ACR128 product presentation by Advanced Card Systems Ltd.ACR128 product presentation by Advanced Card Systems Ltd.
ACR128 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
ACR122L VisualVantage Serial NFC Reader with LCD
ACR122L VisualVantage Serial NFC Reader with LCDACR122L VisualVantage Serial NFC Reader with LCD
ACR122L VisualVantage Serial NFC Reader with LCDAdvanced Card Systems Ltd.
 
Beyond cards, phones and terminals: New payment form factors
Beyond cards, phones and terminals: New payment form factorsBeyond cards, phones and terminals: New payment form factors
Beyond cards, phones and terminals: New payment form factorsNXPSemiconductors
 
Embedded systems security news mar 2011
Embedded systems security news mar 2011Embedded systems security news mar 2011
Embedded systems security news mar 2011AurMiana
 

Viewers also liked (20)

Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/PerspectiveContactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
 
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment Industry
 
NXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
NXP MIFARE Webinar: Complement Use Cases With Mobiles And WearablesNXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
NXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
 
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
 
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
 
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
NfC Forum Mobile NfC Ecosystem White Paper
NfC Forum Mobile NfC Ecosystem White PaperNfC Forum Mobile NfC Ecosystem White Paper
NfC Forum Mobile NfC Ecosystem White Paper
 
La Saga NFC
La Saga NFCLa Saga NFC
La Saga NFC
 
Nfc developers nokia mit event 12 13 10
Nfc developers nokia mit event 12 13 10Nfc developers nokia mit event 12 13 10
Nfc developers nokia mit event 12 13 10
 
Near Field Communication on iPhone with iCarte
Near Field Communication on iPhone with iCarteNear Field Communication on iPhone with iCarte
Near Field Communication on iPhone with iCarte
 
Mobile-based NFC fare collection
Mobile-based NFC fare collectionMobile-based NFC fare collection
Mobile-based NFC fare collection
 
ACR128 product presentation by Advanced Card Systems Ltd.
ACR128 product presentation by Advanced Card Systems Ltd.ACR128 product presentation by Advanced Card Systems Ltd.
ACR128 product presentation by Advanced Card Systems Ltd.
 
Mifare cards
Mifare cardsMifare cards
Mifare cards
 
Mobifyer
MobifyerMobifyer
Mobifyer
 
ACR122L VisualVantage Serial NFC Reader with LCD
ACR122L VisualVantage Serial NFC Reader with LCDACR122L VisualVantage Serial NFC Reader with LCD
ACR122L VisualVantage Serial NFC Reader with LCD
 
Mifare classic-slides
Mifare classic-slidesMifare classic-slides
Mifare classic-slides
 
Beyond cards, phones and terminals: New payment form factors
Beyond cards, phones and terminals: New payment form factorsBeyond cards, phones and terminals: New payment form factors
Beyond cards, phones and terminals: New payment form factors
 
Embedded systems security news mar 2011
Embedded systems security news mar 2011Embedded systems security news mar 2011
Embedded systems security news mar 2011
 

Similar to NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Multi-tenancy In the Cloud
Multi-tenancy In the CloudMulti-tenancy In the Cloud
Multi-tenancy In the Cloudsdevillers
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space미래웹기술연구소 (MIRAE WEB)
 
Work Flow Management from NdimensionZ
Work Flow Management from NdimensionZWork Flow Management from NdimensionZ
Work Flow Management from NdimensionZRadhakrishna Mundoli
 
Technovate Solutions - Profile
Technovate Solutions - ProfileTechnovate Solutions - Profile
Technovate Solutions - ProfileAnish Jhaveri
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
The digital natives are coming
The digital natives are comingThe digital natives are coming
The digital natives are comingSean Massey
 
What's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGWhat's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGSoftware AG South Africa
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...mfrancis
 
Key Trends Fueling Digital Transformation Services.pdf
Key Trends Fueling Digital Transformation Services.pdfKey Trends Fueling Digital Transformation Services.pdf
Key Trends Fueling Digital Transformation Services.pdfCatherine William
 
Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesTeamBreota
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Standards Customer Council
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud eventBLAUD
 

Similar to NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations (20)

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Multi-tenancy In the Cloud
Multi-tenancy In the CloudMulti-tenancy In the Cloud
Multi-tenancy In the Cloud
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
FinDart by Nelito
FinDart by NelitoFinDart by Nelito
FinDart by Nelito
 
Pres 130 markus warg july 20 2016
Pres 130 markus warg july 20 2016Pres 130 markus warg july 20 2016
Pres 130 markus warg july 20 2016
 
Work Flow Management from NdimensionZ
Work Flow Management from NdimensionZWork Flow Management from NdimensionZ
Work Flow Management from NdimensionZ
 
Technovate Solutions - Profile
Technovate Solutions - ProfileTechnovate Solutions - Profile
Technovate Solutions - Profile
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
The digital natives are coming
The digital natives are comingThe digital natives are coming
The digital natives are coming
 
What's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGWhat's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AG
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
Key Trends Fueling Digital Transformation Services.pdf
Key Trends Fueling Digital Transformation Services.pdfKey Trends Fueling Digital Transformation Services.pdf
Key Trends Fueling Digital Transformation Services.pdf
 
Document Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized EnterprisesDocument Management and Digitization solutions for medium sized Enterprises
Document Management and Digitization solutions for medium sized Enterprises
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud event
 

More from NXP MIFARE Team

Security Level 3 (SL3) Capabilities
Security Level 3 (SL3) CapabilitiesSecurity Level 3 (SL3) Capabilities
Security Level 3 (SL3) CapabilitiesNXP MIFARE Team
 
Secure Dynamic Messaging Feature
Secure Dynamic Messaging FeatureSecure Dynamic Messaging Feature
Secure Dynamic Messaging FeatureNXP MIFARE Team
 
Transaction Timer Feature
Transaction Timer FeatureTransaction Timer Feature
Transaction Timer FeatureNXP MIFARE Team
 
NTA's Leap Card - Expanding Ticketing while Shrinking Costs
NTA's Leap Card - Expanding Ticketing while Shrinking CostsNTA's Leap Card - Expanding Ticketing while Shrinking Costs
NTA's Leap Card - Expanding Ticketing while Shrinking CostsNXP MIFARE Team
 

More from NXP MIFARE Team (6)

SL1SL3 MixMode Feature
SL1SL3 MixMode FeatureSL1SL3 MixMode Feature
SL1SL3 MixMode Feature
 
Security Level 3 (SL3) Capabilities
Security Level 3 (SL3) CapabilitiesSecurity Level 3 (SL3) Capabilities
Security Level 3 (SL3) Capabilities
 
Secure Dynamic Messaging Feature
Secure Dynamic Messaging FeatureSecure Dynamic Messaging Feature
Secure Dynamic Messaging Feature
 
Transaction MAC Feature
Transaction MAC FeatureTransaction MAC Feature
Transaction MAC Feature
 
Transaction Timer Feature
Transaction Timer FeatureTransaction Timer Feature
Transaction Timer Feature
 
NTA's Leap Card - Expanding Ticketing while Shrinking Costs
NTA's Leap Card - Expanding Ticketing while Shrinking CostsNTA's Leap Card - Expanding Ticketing while Shrinking Costs
NTA's Leap Card - Expanding Ticketing while Shrinking Costs
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations

  • 1. EXTERNAL USE CHRISTOPH ZWAHLEN JUNE 15TH, 2016 PRESENT IMPROVED - FUTURE INSIDE STREAMLINED USER MANAGEMENT FOR MULTI- VENDOR INSTALLATIONS
  • 2. • Multi-vendor systems are common in IT environments in users daily life • Each user has multiple log-in credentials for individual service reducing the user convenience and the accessibility of services • Significant increase of system maintenance effort to manage user credentials across multiple services • Identity Access Management (IAM) offering harmonized log-in solutions Log-in Credentials Multi-vendor solutions in IT systems June 15, 20162.
  • 3. Agenda 1. Drivers for multi-vendor systems 2. Card Identity Management – optimized for multi- vendor systems 3. Practical implementation • MIFARE DESFire EV2 Christoph Zwahlen Marketing Manager Access Management
  • 4. • Flexibility of contactless smart cards have extended the usage into more applications • Optimized business processes for improved efficiency • Increased comfort and availability through automation of services • Controllability and traceability and reduced cost of service ownership • New use cases introduce new solution specific data structures on contactless smart card • New application specific data structures introducing new identification data structure • Increased efforts in centralized credential management Multi-application contactless smart cards Flexible solutions maximizing organizational benefits June 15, 20164.
  • 5. • Organizations are looking for best solutions fitting the requirements of new use cases • Organizational benefits driving solutions selection • Cost of system ownership • Multi-application solutions enable simplified operation of multi-vendor systems • Extension of application coverage e.g. offline locks replacing mechanical keys • Integration of new use cases, e.g. follow-me printing • Manageability of growing systems for sustainable solutions • Maintainability of system and individual applications • High availability, controllability and traceability of applications Multi-vendor systems Standard ecosystem in growing technology adoption June 15, 20165.
  • 6. Use Cases: Multi-national company Centralized credential management without limiting local autonomy June 15, 20166. • Centralized management of access rights ensuring availability controllability and traceability • E.g. Centralized blocking of credentials • Global credential compatible with local requirements • Local regulations • Site specific security demands • Support of individual local solutions • Flexible system extendibility and maintainability • Enable site specific extension of use cases
  • 7. Multi-vendor vendor systems June 15, 20167. Contactless Smart Card • High acceptance in various applications • User convenience • Fast roll-out of new applications Secure Multi-application • Adaptable to organiza- tional changes • Simple and secure integration into one card Manageable solutions • Central user and right management • Cross application traceability and controllability Shared platform Adaptable solutions Maintainability
  • 8. • Secure multi-application ensure protection of individual applications • Only dedicated devices are enabled to access specific application data • Usage of harmonized card ID not natively supported • Common solutions • Switching of applications resulting in increased transaction times • Harmonized application data structure limiting benefits of individual applications • Duplication of user id in each application increasing system maintenance efforts Challenges of multi-vendor systems June 15, 20168. Root directory PICC Level User ID1 Standard file Application 1 Application ID User ID2 Standard file Application 2 Application ID
  • 9. • Workflow enabling harmonized user management throughout multiple applications and services on card • Compliance with organizational security and privacy requirements • Ensuring centralized controllability and traceability • Single secure user identification accessible from different applications • Simplified multi-vendor solutions • Resource efficient and convenient workflows • Ensuring efficient long-term maintenance of multi- application systems Card Identity Management Cross application user management June 15, 20169.
  • 10. MIFARE DESFire® generation benefits MIFARE DESFire® EV2 June 15, 201610. 2002 MIFARE DESFire 2008 MIFARE DESFire EV1 2015 MIFARE DESFire EV1 256B 2016 MIFARE DESFire EV2 MIFARE DESFire EV1 MIFARE DESFire EV2 ISO/IEC 14443 A 1-4   ISO/IEC 7816-4 support extended extended EEPROM data memory 2/4/8KB 2/4/8KB Flexible file structure   NFC Forum Tag Type 4   Secure, high-speed cmd   Unique ID 7BUID or 4B RID 7BUID or 4B RID Number of applications 28 unlimited Number of files per app 32 32 High data rates support up to 848 Kbit/s up to 848 Kbit/s Crypto algorithms support DES/2K3DES/ 3K3DES/AES DES/2K3DES/ 3K3DES/AES CC certification (HW + SW) EAL 4+ EAL 5+ MIsmartApp feature -  Transaction MAC per app -  Multiple keysets per app - Up to 16 keysets Multiple file access rights - Up to 8 keys Inter-app files sharing -  Virtual Card Architecture -  Proximity Check -  Delivery types Wafer, MOA4 & MOA8 Wafer, MOA4 & MOB6
  • 11. • Improving maintainability and flexibility of multi- vendor installations • Enabling centralized credential management for efficient local credential use cases • Centralized controllability and traceability • Simplified cross-site usage • Optimized overall system maintenance • Support of individual use cases for maximal solution benefits • Flexible introduction of new local applications • Maximize benefits through usage of vendor specific data structure Inter-app files sharing Enhanced card identity management capabilities in MIFARE DESFire EV2 June 15, 201611.
  • 12. Inter-app files sharing – example employee card Employee Card (MIFARE DESFire EV2) Upgrade Employee Card (MIFARE DESFire EV1) Site A Site B Global ID Site BSite A New application in Site A is available to all employees
  • 13. • Verify backwards compatibility of MIFARE DESFire EV2 in existing applications • Integration of Inter-app file sharing • To card management workflows • To infrastructure components • Integration of interfaces to centralized card identity management solutions • E.g. blocking of credentials in system, log-file reporting • Roll-out of flexible solution for multi-vendor environment Inter-app files sharing – Integration Enabling smart solutions June 15, 201613.
  • 14. Thank you Visit us at http://MIFARE.net Follow us: https://twitter.com/nxp_mifare https://at.linkedin.com/in/nxpmifarewww.youtube.com/user/nxpsemiconductorshttp://blog.nxp.com/ https://www.facebook.com/nxpsemi
  • 15. Q&A
  • 16. Webinar Series Outlook Date Title May 24th 2016 MIFARE Innovation Roadmap – present improved, future inside June 1st 2016 How to protect contactless systems today and tomorrow June 8th 2016 Enhanced user experience through active application management June 15th 2016 Streamlined user management for multi-vendor installations June 22nd 2016 Secure closed loop payments in an open environment June 29th 2016 Introduce the future in your today’s system – how to ensure smooth system upgrades July 6th 2016 Added value to card based environments through NFC and cloud – when IoT becomes reality July 13th 2016 Complement use cases with mobiles and wearables