smart card forum 2009, prague, czech republic · 2001 -acquisition of logica, spain 2002...
TRANSCRIPT
© 2008 Oberthur Technologies
Smart Card Forum 2009, Prague, Czech Republic
2© 2009 Oberthur Technologies CONFIDENTIAL
Agenda:
• Oberthur Technologies Introduction
• Convergence
• TSM
• NFC
• WPKI
• Oberthur as Trusted Advisor
© 2008 Oberthur Technologies
Oberthur,A leader in Secure Technologies
4© 2009 Oberthur Technologies CONFIDENTIAL
History and Milestones of the Group
� 1842 - Foundation of Oberthur printing� 1984 - Jean-Pierre Savare takes over the security printing activity
François-Charles Oberthur Fiduciaire
� 1986 - Creation of François-Charles Oberthur Card Systems� 1991 - Creation of François-Charles Oberthur Chèque et Sécu rité� 1993 - Acquisition of Axytrans, France� 1997 - Creation of Oberthur Smart Cards� 1999 - Acquisition of De La Rue Card Systems and creation of Oberthur Card Systems� 2000 - Oberthur Card Systems IPO� 2001 - Opening of a factory in China� 2001 - Acquisition of Logica, Spain� 2002 - Acquisition of Rapsodia, France � 2004 - Opening of a factory in Brazil� 2005 - Acquisition of Africard, SA� 2006 - Opening of a factory in India� 2007 - Acquisition of I’M Technologies, Singapore� 2007 - Creation of Oberthur Technologies� 2008 - Acquisition of XponCard, Copenhagen� 2008 - Delisting from the stock exchange
5© 2009 Oberthur Technologies CONFIDENTIAL
A Group leader in Secure Technologies, organized in 4 Divisions
Identity
Card Systems Cash Protection
Fiduciary Printing
� Number 2 in the card industry� 1Billion cards per year� 500M Smart Cards per year � 600M units personalized per
year
� Manufacture and personalization of secure identity documents
� Traditional and electronic formats
� Public and private sector clients
� Third largest private security printer
� Banknotes, checks and other fiduciary documents
� Over 50 countries served
� Number 1 in cash protection
� Cash-in-Transit, ATM Protection
� 50,000 containers in the field
Worldwide presence 880 M€ revenues in 2008
6500 employees
Worldwide presence 880 M€ revenues in 2008
6500 employees
6© 2009 Oberthur Technologies CONFIDENTIAL
IDENTITY DIVISIONZsolt Arkos, Sales Manager, Identity CE
M: +36 30 685 5036 / [email protected]
CARD SYSTEMS DIVISION – TelecomDavid Lisal, Sales Manager, Telecom CE
M: +36 30 619 6412 / [email protected]
CARD SYSTEMS DIVISION – PaymentHrvoje Vincekovic, Sales Manager
M: +36 30 649 5427 / [email protected]
Oberthur Technologies representation in Czech Repub lic
7© 2009 Oberthur Technologies CONFIDENTIAL
Identity Division offer snapshot
CITIZEN
HEALTHGOVERNMENT
CORPORATE
DRIVING TRAVEL
8© 2009 Oberthur Technologies CONFIDENTIAL
Agenda:
• Oberthur Technologies Introduction
• Convergence
• TSM
• NFC
• WPKI
• Oberthur as Trusted Advisor
9© 2009 Oberthur Technologies CONFIDENTIAL
Convergence
Bank
Government
Mobile Operator
Shops, Supermarkets, Transport Companies, Municipalities, Service Providers
Customer
Convergent means interactive approximation = vzájemné přibližování
10© 2009 Oberthur Technologies CONFIDENTIAL
The mobile phone is an important element to begin the transition from the current “issuer-centric” world to a “customer-centric” world.
Too many cards in your wallet?
© 2008 Oberthur Technologies
Contactles
s
Multi-Service
SecureInteroperable
� Coexistence of ...different services
� Multi-providerservices
- Bank- Transport- Loyalty
� Remote service ..blocking functionality
� Trusted link towards ..mobile operator
� Data restorable
� Fast transaction
� Ease of use as you ...just need to wave the ...phone in front of a ...reader
� Using a U(SIM) ...standardized…platform
� Plug-and-play ...solution
� Breakage resistant...as the card is inside ...the phone
For the sake of convenience
12© 2009 Oberthur Technologies CONFIDENTIAL
Agenda:
• Oberthur Technologies Introduction
• Convergence
• TSM
• NFC
• WPKI
• Oberthur as Trusted Advisor
© 2008 Oberthur Technologies
How is that possible?
Bank & Transport Operators� Offer the lifestyle ...service requested by a ...given enduser
� Need a secure space for ...storage of service ...application (payment or ...transport)
� Build a trusted ...relationship with the ...mobile operators
Mobile Network Operators� Provide the network ...infrastructure that allows ...remote communication ...to the enduser
� Rent out a secure space ...on the U(SIM) for 3. ...party applications
� Build a trusted ...relationship with the ...banks and the transport ...operators
Enabled via a Trusted Service Manager (TSM)
14© 2009 Oberthur Technologies CONFIDENTIAL
Need access to USIM Control Access to USIM
Trusted Service Manager
1414
Eco System
•SSD key rotation
•Load, installation of applets when the SSD supports the
delegated management
•Application personalization, updates, application locking and
unlocking
•Counter reset, PIN change, PIN unblocking
•OTA provisioning
•ISD (Issuer Security Domain) Management, (U)SIM memory
•SSD (Secondary Security Domain) Management (i.e. creation of SD with various privileges)
•Initialization of SSD (i.e. initial temporary key)
•Load, installation and extradition of applets on behalf of the service provider (Simple mode)
•Applications locking, unlocking, deleting, card blocking, …
15© 2009 Oberthur Technologies CONFIDENTIAL
� Dynamic post-issuance capability
� Complete control over the information
stored on the U(SIM) card
� All aspects of card’s life cycle covered
• Personalization
• Activation• Application download
• Upgrade
• Deletion
Software API to interface with all platforms enabling service providers to transparently offer convergence services to their clients
TelepathIC – Remote Service Administration
© 2008 Oberthur Technologies
TelepathIC TSM Service
Web
Interface
Service Modules
� Policy settings� Campaign scheduling� Error corrections� Notifications� Action Tracking
OTA Service Delivery
Partner Management
Service Description
Service Components
Service Deployment
Service Life Cycle Mgt.
Keys Management
Service Provider
Reports
Customer Care
Perso
End User Device
© 2008 Oberthur Technologies
Service Delivery Process - Bank
© 2008 Oberthur Technologies
Service Delivery Process - Transport
19© 2009 Oberthur Technologies CONFIDENTIAL
� Collaboration tools for sharing information among cross-industry partners situated across different computer platforms
� Interactive features supporting the entire card management workflow
� Automated processes that will minimize workload
� Contains features to display progress and status of a given business partner setup
A browser-based application for service delivery and management throughout the service lifecycle
TelepathIC - in summary
20© 2009 Oberthur Technologies CONFIDENTIAL
Value Proposition for Trusted Service Management
� Industry Expertise� Already an established reputation in personalization
services within the mobile industry, banking and transport
� Increase Revenues and Service Usage� New channels to serve your end users� Extend your service offer by providing a superior
payment experience to the end user� Expand the scope of services, link to 3. party services
e.g. loyalty programs� Decrease Cost of Service Deployment
� Cost efficient multi-application card management� Delegated management mechanisms via web tool� 3. party enablement via infrastructure to host and
manage applications on your cards� End-to-End Work Flow Monitoring
� All interfaces and activities between acting parties are documented
� Features to display progress and status of a given business partner setup
TelepathIC
Revenue
Cost
21© 2009 Oberthur Technologies CONFIDENTIAL
Agenda:
• Oberthur Technologies Introduction
• Convergence
• TSM
• NFC
• WPKI
• Oberthur as Trusted Advisor
22© 2009 Oberthur Technologies CONFIDENTIAL
NFC
Mobile Payment
BuildingAccessControl
ContactlessE-Ticketing
Transit NetworkAccess
Peer2PeerData
exchange
AlpsLorem ipsum dolor
sit amet, consectetuer
adipiscing elit. Morbi nec turpis. Morbi nec dolor. Praesent mi. Proinfermentum mi egetmetus. Aliquam eratvolutpat. Aenean
varius erat id ante.
InteractiveAdvertisement
Business opportunities with NFC mobile phones
23© 2009 Oberthur Technologies CONFIDENTIAL
NFC
� SIM centric� The SIM is the SE of the NFC environment� Applications are hosted in the SIM
� What is the NFC environment?� A NFC SIM Card
� ETSI SWP TS 102 613 et ETSI HCI TS 102 622� A handset embedding an antenna and a contactless
front end (CLF)� Extensive OTA functionalities:
� More than Global Platform 2.1: GP2.2 with amendment A (UICC config) and amendment C (NFC registry + Quotas)
NFC high level technical overview
24© 2009 Oberthur Technologies CONFIDENTIAL
� 4 French mobile operators and 6 major banks working together with all industry leaders to do the first steps toward European standardization
NFC - Overview of Payez Mobile phase 1
� Orange
� SFR� Bouygues Telecom
� NRJ Mobile
� Credit Mutuel – CIC
� Société Générale� Crédit Agricole – LCL
� Groupe Caisse d’Epargne
� La Banque Postale� BNP Paribas
Industry players
Oberthur at the top of the knowledge in the NFC payment domain
Visa & MasterCard
Sagem, Motorola, LG, Nokia & Samsung
Sagem Monetel & IngenicoInside Contactless
Oberthur Technologies & Gemalto
���� SIM cards ���� OTA Platform ���� Personalization Services
25© 2009 Oberthur Technologies CONFIDENTIAL
What happened in 2008?
Pilots, Pilots, and pilots…
Main NFC standards frozen
Whole industry turned toward NFC
26© 2009 Oberthur Technologies CONFIDENTIAL
Agenda:
• Oberthur Technologies Introduction
• Convergence
• TSM
• NFC
• WPKI
• Oberthur as Trusted Advisor
27© 2009 Oberthur Technologies CONFIDENTIAL
WPKI hosted solution
WPKI
WPKI
WPKI hosted solution
28© 2009 Oberthur Technologies CONFIDENTIAL
- SIM is Smart Card. RSA crypto Processor and signing client can be EAL 4+ certified.
- Credentials are in Tamper Resistant Storage
- PIN never leaves the phone
- If registration is proper and country has Digital Signature Law, legally binding and nonrepudiatable transactions are possible
- Two Channell, Two Factor and Full PKI
- Military class security, but easiest possible user experience – push signing request direct to mobilephone screen – user gives PIN if OK – done.
- All complexity needed for tackling phising attacks, man in the middle and other security issues ishided from user, service providers and mobile operators.
Why WPKI
Why use a WPKI solution
29© 2009 Oberthur Technologies CONFIDENTIAL
Agenda:
• Oberthur Technologies Introduction
• Convergence
• TSM
• NFC
• WPKI
• Oberthur as Trusted Advisor
30© 2009 Oberthur Technologies CONFIDENTIAL
Oberthur as Trusted Advisor
Establish Needs
Establish Needs
ConseptConsept
Best Practice
Best Practice
Define Strategy
Define Strategy
Execute (planning)
Execute (planning)
A plan for a pilot implementation is sketched out and Oberthur Technologies will return with a solution proposal and draft project plan after the workshop
The strategy is defined covering both technical and business criteria
Oberthur Technologies shares the experience gained from previous pilots, commercial launches and lists the different NFC business models available
General NFC, WPKI or other CONVERGENCEconcept is presented to align expectations with the customer
Brainstorming session where challenges, general and specific needs are listed
Oberthur Technologies offers to be your trusted adviser. Once we have an overview of your needs we can assist in defining your convergence
strategy and outline a goal-oriented project proposal.