Webinar

In this webinar we will address how to secure data being exchanged through the NFC interface and prevent unauthorized access to a device. Starting with an introduction to security goals and cryptographic techniques, typical security architectures will be shown along applications like access and IoT.

Duration
1 hour

Delivered webinar
16.09.2015

Session Description

According to IDC, the number of smart devices that use wireless technology will grow at a breathtaking pace, from 15 billion devices in 2015, to a projected figure of 200 billion by 2020. This means that all those devices will share data between each other by 2020! Needless to say, this is a potential security nightmare for consumers, equipment manufacturers and infrastructure owners alike. How can we build trust in the network of various devices surrounding us?

Security is a key topic to take into account when designing new devices and equipment. It is important to consider all security aspects from the very beginning to avoid breaches in the future. Devices or equipment manufacturers have to face the cost of recovery from a security breach, legal issues, damage to the brand, and eventually negative impact on market share.

Being a proximity technology, NFC is inherently secure. Eavesdropping is nearly impossible. However, application and user specific needs might demand an additional level of security. In this webinar we will address how to secure data being exchanged through the NFC interface and prevent unauthorized access to a device. Starting with an introduction to security goals and cryptographic techniques, typical security architectures will be shown along applications like access and IoT.

Session Contents

  • NFC and security  
    NFC, a different kind of wireless
    Under the hood of NFC based systems
    Security approach of BFC based systems
  • Data exchange protection  
    Infromation security goals
    Cryptographic techniques
    Secure Access Module
  • Device access protection  
    Remote access
    NFC interface access
  • Use cases
    Access control system
    Internet gateway
  • NFC Security cookbook and conclusions

Session audience

  • General Introduction level
    • Sales, Marketing, Business Development
    • FAEs, Development Engineers, Technical Managers

Duration

  • 1 hour

Prerequisites

  • None

System requirements

  • PC-based attendees
    Required: Windows® 8, 7, Vista, XP or 2003 Server
  • Mac®-based attendees
    Required: Mac OS® X 10.6 or newer
  • Mobile attendees
    Required: iPhone®, iPad®, Android™ phone or Android tablet
Back To Top