WO2013072437A1 - Key protected nfc tag method and system, and a method for diversify coupon on a viral distribution chain by nfc - Google Patents

Key protected nfc tag method and system, and a method for diversify coupon on a viral distribution chain by nfc Download PDF

Info

Publication number
WO2013072437A1
WO2013072437A1 PCT/EP2012/072786 EP2012072786W WO2013072437A1 WO 2013072437 A1 WO2013072437 A1 WO 2013072437A1 EP 2012072786 W EP2012072786 W EP 2012072786W WO 2013072437 A1 WO2013072437 A1 WO 2013072437A1
Authority
WO
WIPO (PCT)
Prior art keywords
coupon
tag
nfc
diversify
chain
Prior art date
Application number
PCT/EP2012/072786
Other languages
French (fr)
Inventor
Lionel Brahami
Nicolas BERBIGIER
Original Assignee
Famoco
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Famoco filed Critical Famoco
Publication of WO2013072437A1 publication Critical patent/WO2013072437A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Definitions

  • NFC (Near Field Communication) Tag reader (reader mode) is an important feature of the NFC eco-system. Nevertheless NFC Tags payload is most of the time in plain clear data, with no mean of protection.
  • NFC Tags are subject to attack by just replacing the Tag content, or by sticking another tag with a "fake" content on top of the regular tag. NFC Reader Device has no way to identify if the tag content is valid or not.
  • This invention proposes a solution to issue Tags with authenticated tag's payload, and to let NFC Reader Device enforces security and make sure that Tag content is genuine.
  • the object of the invention is a key protected NFC tag method, wherein a chain of keys is set up and certificate authority is delegated to authenticate content of a RFID tag, and a data format is created and modified to enable the authentication.
  • the current standard for RFID is not able to provide such an authentication.
  • a sign/encrypt tag payload using regular cryptography techniques is implemented.
  • NFC Reader Device shares/stores Keys used to authenticate the Tag's payload.
  • a subsequent problem is that new Tag can surely be issued after the NFC Reader Device issuance, and that tag issuer wants to use their owns keys to protect their tag content.
  • the invention also proposes to let Reader Device synchronize they Key Store with a Key Server. That way new Service Provider is able to issue new Tag with authenticated content, secured with their owns keys, even after Reader Device issuance.
  • NFC Reader Device is an electronic device with at least the following capabilities: NFC Reader mode capability, an Internet connection, and an optional secure storage to store Cryptographic Keys and perform Cryptographic algorithm.
  • NFC Reader Device is named : Reader.
  • Tag we mean data content store in the Tag.
  • the invention aims to enable viral spreading of e-coupon with no Internet connection, while still controlling how many coupons can be spread on the field.
  • the invention also insures that Coupons are tempered protected and that a back end server can authenticate the chain of distribution of Coupon (who gives Coupon to whom).
  • the object of the invention is a method to diversify Coupon on a viral distribution chain by NFC, wherein a chain of keys is set up and certificate authority is delegated to authenticate content of a Coupon.
  • a data format is created to enable the authentication certification and signing by using a signing / authentication protocol to track and certify full coupon transfer chain, and a secure/ authenticated coupon vault is created within the smart card.
  • the invention provides a solution to face different problem :
  • Coupons are stored into Coupon Container Device, which are short range communication device. Two Coupon Container Devices can communicate together (i.e. exchange information) when they are both located within a proximity area which size could vary from few meter to few centimeter.
  • Coupon Container Device A selects on the Device the coupon to "give” to another user's Coupon Container Device B. Then the 2 users move/locate their 2 devices close to each other and Device A "gives” a copy of the Coupon to Device B.
  • FIG. 1 a functional diagram.
  • Figure 3 a Coupon Container Device.
  • Figure 4 a Coupon comprising a Coupon Properties, Tracking History(ies) and a Coupon Signature.
  • Figure 5 distribution of a Coupon from one Coupon Device to another.
  • Figures 6 and 7 the generation of a Transaction History and creation of a Coupon signature.
  • Figure 8 the redeem operation of a coupon and the Tracking History chain process.
  • Each Service Provider SP 1 (SP1, SP2,7) who wants to issue Tags 2 is connected to a central server 4, where they have to register as a "Tag Issuer". On per registration, each SP 1 is given Keys and Identification data that is used to authenticate Tags the SP will issue. That connection can preferably be used only once (at registration time), and can be protected by SSL or other mean in order to protect keys transfer between Server and SP.
  • SP uses Authentication Data and Keys to protect (encrypt and authenticate) Tag data content.
  • Reading NFC Device 5 When reading a Tag, Reading NFC Device 5 reads Tag data content 3 and determines from Tag data who is the issuer. If the NFC Device already has the SP's Keys and authentication data, we skip step 4 (server) and go to step 5 (NFC device).
  • the Reader Device When reading a Tag for the first time, the Reader Device downloads the SP's Key and authentication data, and go to step 5.
  • NFC Device enforces Tag data authentication, and process Tag data.
  • SP When issuing Tags, SP generates an authenticated Tag content, that contains Tag data (like URL, Text, Phone number, etc, authentication data and cryptogram.
  • Tag content is made of a Tag Header and Tag Data.
  • the Tag Header contains information that lets the Reader understand how the Tag content is protected.
  • Table 2 indicates if MAC is present and if data is encrypted.
  • Security Level byte is encoded as followed :
  • X X X 1 MAC is present with algo type defined in byte 1 to 3
  • Table 3 indicates the Key configuration :
  • the key value is coded in plain text with a length of 16 bytes. Reader will use this key to verify the "MAC" and/or encrypt Data.
  • Issuer ID is store on 2 bytes and used to identify the Key used to protect this tag. If the Key value is present in the Tag Header, then Key Issuer ID add an extra level of diversification in the calculation of the "MAC"/Encrypted data.
  • the MSB 4 bits of byte 1 of this field indicate the length of the Key Diversification Element. If the value of this byte is 0, then there is no Diversification Element.
  • MAC is a 8 byte “MAC” calculated from Data & Tag issuer's Key according to “MAC” algorithm coded by Security Level byte.
  • Data is Tag's payload data.
  • Data length is total Tag's payload length minus Tag's header length.
  • Data can be plain text or encrypted using Tag issuer's key and according to encryption algorithm coded by Security Level byte.
  • Each RFID tag will be labeled A, B, C or D or 1, 2, 3 and 4. Such sets are stick on each university desk or given to people in the crowd. All set are identical, but each tag within a set is identified by a unique ID number written into the memory of the RFID chip. Such chip is a read only chip;
  • Mobile NFC device 22 which is made of at least RFID Tag reading capability, internet connection (either by wifi or GSM), and a LCD display.
  • Each Mobile NFC Device is identified by a unique serial number. Such number is used to identify the device on each Internet communication;
  • the QCM issuing server 23 that host the list of QCM, and through Internet connection send each to them to each device and receive the answer.
  • the QCM Server received all answers.
  • FIG. 3 describes a Coupon Container Device 101 with a Memory 102, a CPU 103, a separated Crypto Calculator 104 that could be a SIM Card or a SE and a short range connectivity interface such as NFC, Bluetooth, zigbee, IR, ...108.
  • the memory 102 contains 0 or more coupons illustrated in Figure 3 with coupon # 1 106 and coupon #2 107, and Container Properties 105.
  • the Container Properties 105 contains amount other related application information, the device ID that identified uniquely a device amount a fleet of devices.
  • Figure 4 describes a Coupon 201 made of:
  • Coupon Properties main function is to uniquely identify a coupon and control the spreading of the coupon. It can also be used to store redeem information, such as value, discount, expiration date, validity date, etc.
  • Coupon Properties has 2 parameters Largeness Count 206 and Deepness Count 207 to control the number of Coupons that will be spread on the field.
  • Largeness Count 206 defines how many times the same coupon can be distributed (duplicated) by the same user to other unique user (same coupon can't be given twice to the same user).
  • Deepness Count 207 defines how long is the chain of user who will distribute/duplicate the same coupon.
  • Figure 5 describes how a coupon is distributed from one Coupon Container Device to another.
  • Coupon Container 301 is the coupon distribution source
  • Coupon Container 310 is the coupon distribution recipient.
  • Coupon Container 301 and 310 enter the proximity zone 308 and that Coupon 302 is selected to be distributed a new Coupon 311 is created into Coupon Container Device 310's memory.
  • Coupon Properties 312 is created from Coupon Properties 303 and adjusted according to propagation rules defined by the coupon. For example the deepness can be decreased and if reach 0 then the coupon can no longer be distributed to anyone;
  • Coupon Signature 314 is created to protect coupon 311 against tempering. Such crypto calculation is performed by Crypto Calculator 311 of Coupon Container 310.
  • Figures 6 and 7 show how a Transaction History is generated and how Coupon Signature is calculated.
  • Transaction History is used to track Coupon distribution from one Coupon Container Device to another.
  • a Transaction History 404 is generated by the issuing device (Coupon Container Device 301 from Fig 3) and is made of Tracking Data 401 and a Signature 405 created by a Crypto Algorithm 403 that takes in input Tracking Data 401and Device's Secret Key 402.
  • Tracking Data 401 is made with the following data :
  • Coupon ID which identify uniquely a Coupon within the backend server running a coupon generation system. This information can be found into the Coupon Properties 202;
  • Coupon Signature 205 is used to protect Coupon information (Coupon Properties 202, Tracking History # 1 ... #n 203 & 204) against modification
  • a Coupon Signature 409 is generated by the receiving Coupon Container Device's Crypto Calculator 406. As more detailed in Figure 7, a Coupon Signature 409 is created by signature algorithm 410 that takes in input:
  • Figure 8 illustrates the redeem operation of a coupon and how the Tracking History chain is processed.
  • the Redeem Device 504 read the coupon information 502 and connect to backend Server 505 to process the operation. Redeem process operation can be done on the back end server or on the Redeem Device 505.
  • Redeem process is as following :
  • Coupon Signature 507 to insure security and check if coupon has not been tempered
  • Redeem Device checks each Tracking History # 1 to #n (508 to 509), to analyze the propagation chain of the coupon. For each Tracking History Redeem Device check the signature to insure that no fake device are in the chain;

Abstract

Authenticating near field communication (NFC) by signing the payload of a message using a chain of keys and creating a data format for enabling authentication. Authentication is enabled by embedding in the message a certificate chain associated with the chain of keys used to sign the message. A particular embodiment relates to viral distribution of a coupon using NFC and involves signing the coupon tracking history at each stage of the distribution so that a recipient can verify the transfer chain of the coupon.

Description

KEY PROTECTED NFC TAG METHOD AND SYSTEM, AND A METHOD FOR DIVERSIFY COUPON ON A VIRAL DISTRIBUTION CHAIN BY NFC
Description
Technical field and background
NFC (Near Field Communication) Tag reader (reader mode) is an important feature of the NFC eco-system. Nevertheless NFC Tags payload is most of the time in plain clear data, with no mean of protection.
Therefore NFC Tags are subject to attack by just replacing the Tag content, or by sticking another tag with a "fake" content on top of the regular tag. NFC Reader Device has no way to identify if the tag content is valid or not.
Summary of the invention
This invention proposes a solution to issue Tags with authenticated tag's payload, and to let NFC Reader Device enforces security and make sure that Tag content is genuine.
More specifically, the object of the invention is a key protected NFC tag method, wherein a chain of keys is set up and certificate authority is delegated to authenticate content of a RFID tag, and a data format is created and modified to enable the authentication.
The current standard for RFID is not able to provide such an authentication. To protect Tag payload, a sign/encrypt tag payload using regular cryptography techniques is implemented. NFC Reader Device shares/stores Keys used to authenticate the Tag's payload.
A subsequent problem is that new Tag can surely be issued after the NFC Reader Device issuance, and that tag issuer wants to use their owns keys to protect their tag content.
So, the invention also proposes to let Reader Device synchronize they Key Store with a Key Server. That way new Service Provider is able to issue new Tag with authenticated content, secured with their owns keys, even after Reader Device issuance.
In that invention we assume that NFC Reader Device is an electronic device with at least the following capabilities: NFC Reader mode capability, an Internet connection, and an optional secure storage to store Cryptographic Keys and perform Cryptographic algorithm.
Later on in this document the NFC Reader Device is named : Reader. By Tag we mean data content store in the Tag.
According to anther aspect, the invention aims to enable viral spreading of e-coupon with no Internet connection, while still controlling how many coupons can be spread on the field.
The invention also insures that Coupons are tempered protected and that a back end server can authenticate the chain of distribution of Coupon (who gives Coupon to whom).
More specifically, the object of the invention is a method to diversify Coupon on a viral distribution chain by NFC, wherein a chain of keys is set up and certificate authority is delegated to authenticate content of a Coupon. A data format is created to enable the authentication certification and signing by using a signing / authentication protocol to track and certify full coupon transfer chain, and a secure/ authenticated coupon vault is created within the smart card.
The invention provides a solution to face different problem :
- How to uniquely identify the newly created Coupon in Device
B;
- How to synchronize the newly created Coupon with a backend server when no Internet connection is available;
- How to control the distribution and limit the spread of Coupon (control how many coupons can be spread on the field); and/or
- How to authenticate the chain of distribution and make sure no fake coupon and/or Coupon Container Device are part of the chain.
Coupons are stored into Coupon Container Device, which are short range communication device. Two Coupon Container Devices can communicate together (i.e. exchange information) when they are both located within a proximity area which size could vary from few meter to few centimeter.
The user of a Coupon Container Device A selects on the Device the coupon to "give" to another user's Coupon Container Device B. Then the 2 users move/locate their 2 devices close to each other and Device A "gives" a copy of the Coupon to Device B.
Brief description of drawings
The overall scheme of Tag issuing can be seen on figure 1. Figure 2: a functional diagram. Figure 3: a Coupon Container Device.
Figure 4: a Coupon comprising a Coupon Properties, Tracking History(ies) and a Coupon Signature. Figure 5: distribution of a Coupon from one Coupon Device to another.
Figures 6 and 7: the generation of a Transaction History and creation of a Coupon signature.
Figure 8: the redeem operation of a coupon and the Tracking History chain process.
Preferred Embodiments of the invention
The overall scheme of Tag issuing system can be seen on figure 1.
Each Service Provider SP 1 (SP1, SP2,...) who wants to issue Tags 2 is connected to a central server 4, where they have to register as a "Tag Issuer". On per registration, each SP 1 is given Keys and Identification data that is used to authenticate Tags the SP will issue. That connection can preferably be used only once (at registration time), and can be protected by SSL or other mean in order to protect keys transfer between Server and SP.
When issuing Tags, SP uses Authentication Data and Keys to protect (encrypt and authenticate) Tag data content.
When reading a Tag, Reading NFC Device 5 reads Tag data content 3 and determines from Tag data who is the issuer. If the NFC Device already has the SP's Keys and authentication data, we skip step 4 (server) and go to step 5 (NFC device).
When reading a Tag for the first time, the Reader Device downloads the SP's Key and authentication data, and go to step 5.
NFC Device enforces Tag data authentication, and process Tag data. When issuing Tags, SP generates an authenticated Tag content, that contains Tag data (like URL, Text, Phone number,...), authentication data and cryptogram.
Tag content is made of a Tag Header and Tag Data. The Tag Header contains information that lets the Reader understand how the Tag content is protected.
Tag Header has the following format (Table 1) :
Figure imgf000006_0001
Table 1
Table 2 indicates if MAC is present and if data is encrypted. Security Level byte is encoded as followed :
B7 B6 B5 B4 B3 B2 Bl BO
X X X 0 X X X 0 No security. Data start on byte 2
0 0 0 1 MAC is present with default algo type
X X X 1 MAC is present with algo type defined in byte 1 to 3
0 0 0 1 Data is encrypted with default algo type
X X X 1 Data is encrypted with with algo type defined in byte 1 to 3 Table 2
Table 3 indicates the Key configuration :
Figure imgf000007_0001
Table 3
The key value is coded in plain text with a length of 16 bytes. Reader will use this key to verify the "MAC" and/or encrypt Data.
Issuer ID is store on 2 bytes and used to identify the Key used to protect this tag. If the Key value is present in the Tag Header, then Key Issuer ID add an extra level of diversification in the calculation of the "MAC"/Encrypted data.
The MSB 4 bits of byte 1 of this field indicate the length of the Key Diversification Element. If the value of this byte is 0, then there is no Diversification Element.
Diversification Element is store in plain text, with a max length of 16 bytes.
"MAC" is a 8 byte "MAC" calculated from Data & Tag issuer's Key according to "MAC" algorithm coded by Security Level byte.
Data is Tag's payload data. Data length is total Tag's payload length minus Tag's header length. Data can be plain text or encrypted using Tag issuer's key and according to encryption algorithm coded by Security Level byte.
Considering the NFC based QCM session, the system represented in the diagram of figure 2 has the following components:
- set of RFID Tags (Tag Set) 21. Each RFID tag will be labeled A, B, C or D or 1, 2, 3 and 4. Such sets are stick on each university desk or given to people in the crowd. All set are identical, but each tag within a set is identified by a unique ID number written into the memory of the RFID chip. Such chip is a read only chip;
- a Mobile NFC device 22 which is made of at least RFID Tag reading capability, internet connection (either by wifi or GSM), and a LCD display. Each Mobile NFC Device is identified by a unique serial number. Such number is used to identify the device on each Internet communication;
- the QCM issuing server 23 that host the list of QCM, and through Internet connection send each to them to each device and receive the answer.
The QCM Server received all answers.
Figure 3 describes a Coupon Container Device 101 with a Memory 102, a CPU 103, a separated Crypto Calculator 104 that could be a SIM Card or a SE and a short range connectivity interface such as NFC, Bluetooth, zigbee, IR, ...108.
The memory 102 contains 0 or more coupons illustrated in Figure 3 with coupon # 1 106 and coupon #2 107, and Container Properties 105.
The Container Properties 105 contains amount other related application information, the device ID that identified uniquely a device amount a fleet of devices. Figure 4 describes a Coupon 201 made of:
- a Coupon Properties 202,
- 0 or more Tracking History illustrated in Fig 2 with Tracking History # 1 203 and Tracking History #n 204,
- a Crypto Signature 205 used to protect the coupon again authorized modification.
Coupon Properties main function is to uniquely identify a coupon and control the spreading of the coupon. It can also be used to store redeem information, such as value, discount, expiration date, validity date, etc.
Coupon Properties has 2 parameters Largeness Count 206 and Deepness Count 207 to control the number of Coupons that will be spread on the field.
Largeness Count 206 defines how many times the same coupon can be distributed (duplicated) by the same user to other unique user (same coupon can't be given twice to the same user).
Deepness Count 207 defines how long is the chain of user who will distribute/duplicate the same coupon.
Figure 5 describes how a coupon is distributed from one Coupon Container Device to another.
Coupon Container 301 is the coupon distribution source, Coupon Container 310 is the coupon distribution recipient. When 301 and 310 enter the proximity zone 308 and that Coupon 302 is selected to be distributed a new Coupon 311 is created into Coupon Container Device 310's memory.
At Coupon 311 creation time, the following operations are done: - Coupon Properties 312 is created from Coupon Properties 303 and adjusted according to propagation rules defined by the coupon. For example the deepness can be decreased and if reach 0 then the coupon can no longer be distributed to anyone;
- tracking History 304 is duplicated into Tracking History 313;
- tracking History 314 is created by the Crypto Calculator 307 of Coupon Container 301, transmitted to Coupon Container 310. Figures 8 and 9 describe how Tracking History 314 is created;
- a new Coupon Signature 314 is created to protect coupon 311 against tempering. Such crypto calculation is performed by Crypto Calculator 311 of Coupon Container 310.
Figures 6 and 7 show how a Transaction History is generated and how Coupon Signature is calculated.
Transaction History is used to track Coupon distribution from one Coupon Container Device to another. A Transaction History 404 is generated by the issuing device (Coupon Container Device 301 from Fig 3) and is made of Tracking Data 401 and a Signature 405 created by a Crypto Algorithm 403 that takes in input Tracking Data 401and Device's Secret Key 402.
In order to resist Tamper attack and ensure confidentiality of the Secret Key and of the processing of the algorithm, signature processing of the Crypto Algorithm 403 and the Device's Secret Key 402 injection into the algorithm are made within the Crypto Calculator 406.
Tracking Data 401 is made with the following data :
- Coupon ID, which identify uniquely a Coupon within the backend server running a coupon generation system. This information can be found into the Coupon Properties 202;
- date and time of the new coupon creation/distribution; - device ID of the Coupon Container Device used as the coupon distribution source. This information can be found into the Device Properties 105;
- any other data used to qualify and characterize the coupon type and the coupon distribution source.
Coupon Signature 205 is used to protect Coupon information (Coupon Properties 202, Tracking History # 1 ... #n 203 & 204) against modification
A Coupon Signature 409 is generated by the receiving Coupon Container Device's Crypto Calculator 406. As more detailed in Figure 7, a Coupon Signature 409 is created by signature algorithm 410 that takes in input:
- a concatenated form of Coupon Properties 407 with the list of Tracking History # 1 to Tracking History #n 408;
- the Coupon Container Device's Secret Key 408.
In order to resist tamper attack and ensure confidentiality of the Secret Key and of the processing of the algorithm, signature processing of the Crypto algorithm 410 and the Device's Secret Key 402 injection into the algorithm are made within the Crypto Calculator 406.
Figure 8 illustrates the redeem operation of a coupon and how the Tracking History chain is processed.
User performs a redeem action from the Coupon Container Device 501 of the selected Coupon 502 when the device enters the Proximity area 506. Using short range communication technologies (such as NFC, Bluetooth, zigbee, ...), the Redeem Device 504 read the coupon information 502 and connect to backend Server 505 to process the operation. Redeem process operation can be done on the back end server or on the Redeem Device 505.
Redeem process is as following :
- redeem Device reads Coupon Properties 503 to identify the Coupon being redeemed;
- redeem Device checks Coupon Signature 507 to insure security and check if coupon has not been tempered;
- then Redeem Device checks each Tracking History # 1 to #n (508 to 509), to analyze the propagation chain of the coupon. For each Tracking History Redeem Device check the signature to insure that no fake device are in the chain;
- information is then consolidated on the Backend Server 505.

Claims

Claims
1. Key protected NFC tag method, characterized in that a chain of keys is set up and certificate authority is delegated to authenticate content of a RFID tag, and a data format is created and modified to enable the authentication.
2. Key protected NFC tag method according to claim 1, wherein, to protect Tag payload, a sign/encrypt tag payload using regular cryptography techniques is implemented and a NFC Reader Device shares/stores Keys is used to authenticate the Tag's payload.
3. Key protected NFC tag method according to claim 2, wherein the Reader Device synchronizes they Key Store with a Key
Server to issue new Tag with authenticated content and secured with their owns keys.
4. Key protected NFC tag method according to claim 2 or 3, wherein the NFC Reader is able to have the capabilities of a mode capability, an Internet connection, and an optional secure storage to store Cryptographic Keys and perform Cryptographic algorithm.
5. Key protected NFC tag system to implement the method according to any preceding claim, wherein each Service Provider (SP) who wants to issue Tags is connected to a central server, where they register as a "Tag Issuer" and on per registration, each SP is given Keys and Identification data that is used to authenticate Tags the SP will issue.
6. Method to diversify Coupon on a viral distribution chain by NFC, characterized in that a chain of keys is set up and certificate authority is delegated to authenticate content of a Coupon, a data format is created to enable the authentication certification and sign by using a signing / authentication protocol to track and certify full coupon transfer chain, and a secure/ authenticated coupon vault is created within the smart card.
7. Method to diversify Coupon according to claim 6, wherein Coupons are stored into a Coupon Container Device, which are short range communication device, two Coupon Container Devices being able to communicate together when they are both located within a proximity area which size vary from few meter to few centimeter.
8. Method to diversify Coupon according to the preceding claim, wherein the Coupon Container Device (101) has a Memory (102) containing 0 or more coupons (106, 107), a CPU (103), a separated Crypto Calculator (104), a SIM Card or a Secure Element, a short range connectivity interface (108) and a Container Properties (105) that contains amount other related application information.
9. Method to diversify Coupon according to any of claim
6 to 8, wherein a Coupon (201) is made of a Coupon Properties (202), 0 or more Tracking History (203, 204), and a Crypto Signature (205) used to protect the coupon again authorized modification.
10. Method to diversify Coupon according any of to claim
7 to 9, wherein a coupon is distributed from one Coupon Container Device to another, a Coupon Container (301) being the coupon distribution source that is the coupon distribution recipient and wherein, when Coupon Containers (301, 310) enter the proximity zone (308) and that Coupon (302) is selected to be distributed, a new Coupon (311) is created into Coupon Container Device (310) memory.
11. Method to diversify Coupon according any of to claim 7 to 10, wherein a Transaction History (404) is used to track Coupon distribution from one Coupon Container Device to another, the Transaction History (404) being generated by the issuing Coupon Container Device (301) and is made of Tracking Data 401, and a Signature (405) is created by a Crypto Algorithm (403) that takes in input Tracking Data (401) and Device's Secret Key (402).
12. Method to diversify Coupon according to the preceding claim, wherein a Redeem process is implemented as following : redeem Device reads Coupon Properties (503) to identify the Coupon being redeemed; redeem Device checks Coupon Signature (507) to insure security and check if coupon has not been tempered; then Redeem Device checks each Tracking History (508 to 509), to analyze the propagation chain of the coupon and, for each Tracking History Redeem Device, checks the signature to insure that no fake device are in the chain, information being then consolidated on the Backend Server (505).
PCT/EP2012/072786 2011-11-18 2012-11-15 Key protected nfc tag method and system, and a method for diversify coupon on a viral distribution chain by nfc WO2013072437A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR11/03511 2011-11-18
FR1103511 2011-11-18

Publications (1)

Publication Number Publication Date
WO2013072437A1 true WO2013072437A1 (en) 2013-05-23

Family

ID=47435871

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2012/072786 WO2013072437A1 (en) 2011-11-18 2012-11-15 Key protected nfc tag method and system, and a method for diversify coupon on a viral distribution chain by nfc

Country Status (1)

Country Link
WO (1) WO2013072437A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2507742A (en) * 2012-11-07 2014-05-14 Crisp Telecom Ltd Service selection from reading a machine readable tag
CN104350513A (en) * 2013-07-26 2015-02-11 华为终端有限公司 Method and device for identifying label
US9016562B1 (en) 2013-12-17 2015-04-28 Xerox Corporation Verifying relative locations of machine-readable tags using composite sensor data
US9299043B2 (en) 2013-12-17 2016-03-29 Xerox Corporation Virtual machine-readable tags using sensor data environmental signatures
US9380050B2 (en) 2014-06-20 2016-06-28 Xerox Corporation Scan image authentication
US9681302B2 (en) 2012-09-10 2017-06-13 Assa Abloy Ab Method, apparatus, and system for providing and using a trusted tag
US9685057B2 (en) 2013-03-15 2017-06-20 Assa Abloy Ab Chain of custody with release process
US9703968B2 (en) 2014-06-16 2017-07-11 Assa Abloy Ab Mechanisms for controlling tag personalization
US9747768B1 (en) 2016-02-25 2017-08-29 Xerox Corporation System and method for proving physical presence
WO2017161300A1 (en) * 2016-03-17 2017-09-21 Allle Inc. Managing program credentials on electronic devices
US9825941B2 (en) 2013-03-15 2017-11-21 Assa Abloy Ab Method, system, and device for generating, storing, using, and validating tags and data
US10237072B2 (en) 2013-07-01 2019-03-19 Assa Abloy Ab Signatures for near field communications
US10440012B2 (en) 2014-07-15 2019-10-08 Assa Abloy Ab Cloud card application platform
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030236756A1 (en) * 2001-06-21 2003-12-25 Metabyte Networks, Inc. Method and system for electronic purchases using an intelligent data carrier medium, electronic coupon system, and interactive TV infrastructure
US20100299527A1 (en) * 2008-07-09 2010-11-25 Samsung Electronics Co., Ltd Near field communication (nfc) device and method for selectively securing records in a near field communication data exchange format (ndef) message
WO2011046849A2 (en) * 2009-10-16 2011-04-21 Microsoft Corporation Viral distribution and tracking of electronic coupons

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030236756A1 (en) * 2001-06-21 2003-12-25 Metabyte Networks, Inc. Method and system for electronic purchases using an intelligent data carrier medium, electronic coupon system, and interactive TV infrastructure
US20100299527A1 (en) * 2008-07-09 2010-11-25 Samsung Electronics Co., Ltd Near field communication (nfc) device and method for selectively securing records in a near field communication data exchange format (ndef) message
WO2011046849A2 (en) * 2009-10-16 2011-04-21 Microsoft Corporation Viral distribution and tracking of electronic coupons

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
MICHAEL ROLAND ET AL: "Security Vulnerabilities of the NDEF Signature Record Type", NEAR FIELD COMMUNICATION (NFC), 2011 3RD INTERNATIONAL WORKSHOP ON, IEEE, 22 February 2011 (2011-02-22), pages 65 - 70, XP031937008, ISBN: 978-1-61284-176-2, DOI: 10.1109/NFC.2011.9 *

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9681302B2 (en) 2012-09-10 2017-06-13 Assa Abloy Ab Method, apparatus, and system for providing and using a trusted tag
GB2507742A (en) * 2012-11-07 2014-05-14 Crisp Telecom Ltd Service selection from reading a machine readable tag
US9860236B2 (en) 2013-03-15 2018-01-02 Assa Abloy Ab Method, system and device for generating, storing, using, and validating NFC tags and data
US10652233B2 (en) 2013-03-15 2020-05-12 Assa Abloy Ab Method, system and device for generating, storing, using, and validating NFC tags and data
US11172365B2 (en) 2013-03-15 2021-11-09 Assa Abloy Ab Method, system, and device for generating, storing, using, and validating NFC tags and data
US11026092B2 (en) 2013-03-15 2021-06-01 Assa Abloy Ab Proof of presence via tag interactions
US10404682B2 (en) 2013-03-15 2019-09-03 Assa Abloy Ab Proof of presence via tag interactions
US9685057B2 (en) 2013-03-15 2017-06-20 Assa Abloy Ab Chain of custody with release process
US9825941B2 (en) 2013-03-15 2017-11-21 Assa Abloy Ab Method, system, and device for generating, storing, using, and validating tags and data
US11252569B2 (en) 2013-03-15 2022-02-15 Assa Abloy Ab Method, system, and device for generating, storing, using, and validating NFC tags and data
US10237072B2 (en) 2013-07-01 2019-03-19 Assa Abloy Ab Signatures for near field communications
US9564950B2 (en) 2013-07-26 2017-02-07 Huawei Device Co., Ltd. Tag identification method and apparatus
CN104350513A (en) * 2013-07-26 2015-02-11 华为终端有限公司 Method and device for identifying label
US9016562B1 (en) 2013-12-17 2015-04-28 Xerox Corporation Verifying relative locations of machine-readable tags using composite sensor data
US9299043B2 (en) 2013-12-17 2016-03-29 Xerox Corporation Virtual machine-readable tags using sensor data environmental signatures
US9703968B2 (en) 2014-06-16 2017-07-11 Assa Abloy Ab Mechanisms for controlling tag personalization
US9380050B2 (en) 2014-06-20 2016-06-28 Xerox Corporation Scan image authentication
US10440012B2 (en) 2014-07-15 2019-10-08 Assa Abloy Ab Cloud card application platform
US9747768B1 (en) 2016-02-25 2017-08-29 Xerox Corporation System and method for proving physical presence
WO2017161300A1 (en) * 2016-03-17 2017-09-21 Allle Inc. Managing program credentials on electronic devices
US10601796B2 (en) 2016-03-17 2020-03-24 Apple Inc. Managing program credentials on electronic devices
CN108886687B (en) * 2016-03-17 2021-06-25 苹果公司 Managing scheduled credentials on an electronic device
CN113286303A (en) * 2016-03-17 2021-08-20 苹果公司 Managing scheduled credentials on an electronic device
CN108886687A (en) * 2016-03-17 2018-11-23 苹果公司 Manage the plan authority on electronic equipment
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Similar Documents

Publication Publication Date Title
WO2013072437A1 (en) Key protected nfc tag method and system, and a method for diversify coupon on a viral distribution chain by nfc
CN112602300B (en) System and method for password authentication of contactless cards
US20220116745A1 (en) Methods and systems for asset obfuscation
TWI497336B (en) Data security devices and computer program
US20200104841A1 (en) Systems and methods for cryptographic authentication of contactless cards
CN106452756A (en) Construction verification method and device capable of verifying security two-dimensional code offline
Dominikus et al. mCoupons: An application for near field communication (NFC)
CN107925572A (en) Secure binding of the software application to communicator
CN101770619A (en) Multiple-factor authentication method for online payment and authentication system
CN102769623B (en) Two-factor authentication method based on digital certificate and biological identification information
CN102834830A (en) Method for reading an attribute from an id token
GB2512595A (en) Integrated contactless mpos implementation
US20140289129A1 (en) Method for secure contactless communication of a smart card and a point of sale terminal
CN101162535B (en) Method and system for realizing magnetic stripe card trading by IC card
CN102118251A (en) Security authentication method for internet banking remote payment based on multi-interface intelligent safety card
US20150142667A1 (en) Payment authorization system
CA3109986A1 (en) Systems and methods for cryptographic authentication of contactless cards
CN102238193A (en) Data authentication method and system using same
US20230254339A1 (en) Systems and methods for signaling an attack on contactless cards
CN104282091A (en) Bill data generating/transmitting/storing/authenticating method
CA3114753A1 (en) Systems and methods for cryptographic authentication of contactless cards
CN108777673A (en) One kind carrying out Bidirectional identity authentication method in block chain
SG128516A1 (en) Updating a mobile payment device
CN104143142A (en) Payment system with mobile payment unit and security payment method
CA3114915A1 (en) Systems and methods for cryptographic authentication of contactless cards

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12806353

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12806353

Country of ref document: EP

Kind code of ref document: A1