1 / 20

Natural Security Initiative Loic Berton - Benoit Courouble - Dominique Pierre MWG , July 2012

Natural Security Initiative Loic Berton - Benoit Courouble - Dominique Pierre MWG , July 2012. Natural Security key features.

lilith
Download Presentation

Natural Security Initiative Loic Berton - Benoit Courouble - Dominique Pierre MWG , July 2012

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Natural Security InitiativeLoic Berton- Benoit Courouble - Dominique Pierre MWG, July 2012

  2. Natural Security key features • Natural Security provides the first efficient and really easy-to-use three-factor authentication solution by enabling a consumer to conduct a transaction without manipulating its personal device or card • The transaction is executed using a mid-range distance contactless interface combined with biometric authentication of the consumer • The solution provides a unique user experience to authenticate for a wide range of services: • Physical or logical access control • Payment, Cash withdrawal • Secure access to Internet services • Biometrics are securely stored in a secure element embedded in the consumer device providing increased privacy (no biometrics data stored remotely in data base, no PIN entering)

  3. How does it work ? Acceptance devices Consumer devices Wireless network Fob Card all-in-one range: 3 to 9 feet Mobile handset

  4. Pilot implementation: payment • Pilot implementation being launched in 2 locations in France • Secured payment transaction using chip and PIN technologies • payment transaction executed in a few seconds • no card to manipulate, no PIN to enter • First pilot in the worldusing 2 different biometric technologies (fingervein and fingerprint) in a real payment environment

  5. Real life transaction execution

  6. Market Verticals Targeted • Natural Security innovation brings to the ZigBee Alliance the fast growing strong authentication market • Corporate • Healthcare • Government & Administration • Transportation • School campus • Retail • Financial institution

  7. Market Segments Targeted • Services targeted & Market size • Physical & Logical access > 1 billion badges* • Secure access to web server > 2 billions PC* • Payment 2.5 billions cards** 37 millions POS** • Cash withdrawal 2.2 millions ATM** * estimate ** source Eurosmart

  8. Timeline • 2006 – Project started by banks and retailers • 2008 – Company creation • 2010 – General availability of the first version of the specs, first proofs of concept • 2011-2012 – Launch of the commercial phase • Several pilots planned in 2012: payment (open and close loop), access control (physical and logical), mobile payment • Development of industrial "off-the-shelf” NS products

  9. Our Partners Other vendors coming soon naccu.org Shareholders First vendors Memberships Technical partners

  10. WPAN Components 10

  11. Technologies evaluated • NFC (not adopted) • Require the consumer to handle the device to execute a transaction which takes beyond the 3 sec. maximum transaction time • Does not provide a unique user experience for all types of transactions • Strong concern on the security and the confidentiality of the solution (data transmitted in clear between the merchant and the consumer devices) • Bluetooth Smart (a.k.a. BTLE) (not adopted) • Modulation scheme susceptible to interference • NS-WPAN architecture challenging to implement • Latency variability too large for requirements • IEEE 802.15.4 (adopted) • Native support for NS-WPAN architecture • Acceptable, predictable latency

  12. Why do we need a « new » stack ? • Our WPAN implementation must respect several key requirements defined by government agencies such as : • Anonymous • No traceable protocol • Star topology (mesh topology cannot be used, introduces risk factors) • Fully reconfigurable, no coordinator • And we add : • Dynamic and mobility • Mid range (between 1m to 3m) • High density of device • And low cost …

  13. matrix of market requirements against network features

  14. Comparaison NFC / Bluetooth

  15. Natural security Network Topology POS1 Retail A Retail B WAD POS1 WPD Retail C POS2 POS1

  16. Why do we need a « ZigBee » stack ? • Our stack will be implemented by several vendors • Large organizations such as payment schemes will adopt this protocol only if it is owned and supported by an open association • We conducted research to use other stacks or protocols (ZigBeepro, RF4CE, Dash7, Bluetooth) • They don't meet our key business, technical and security requirements • BLE could also be a potential good candidate • however, 802.15.4 is considered as the best option at present

  17. Current situation • Technical specification developed by natural security • Test plan developed by UL (RFI Global) • The stack has been implemented on several chips used by multiple vendors: • Atmel • TI • ST (being currently tested) • Strong, active support of large retailers and financial institutions

  18. Next steps … • Creation of a WG • Natural Security proposes to act as technical editor and chair of the WG • Natural Security will provide for free • The specification • The test plan

  19. Thank you 19

  20. www.zigbee.org

More Related