<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; NFC</title>
	<atom:link href="https://javacard.vetilles.com/tag/nfc/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Experimenting NFC, things</title>
		<link>https://javacard.vetilles.com/2013/03/27/experimenting-nfc-things/</link>
		<comments>https://javacard.vetilles.com/2013/03/27/experimenting-nfc-things/#comments</comments>
		<pubDate>Wed, 27 Mar 2013 11:37:12 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[NFC]]></category>
		<category><![CDATA[VRM]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=868</guid>
		<description><![CDATA[Following my little NFC rants, I have kept on experimenting with Android NFC applications and reading about the Internet of Things (experimenting remains harder, here). The combination is trendy these days, as this week will see the launch of a new initiative in France with the French chapter of ACM SIGOPS (in French). I won&#8217;t [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Following my little NFC rants, I have kept on experimenting with Android NFC applications and reading about the Internet of Things (experimenting remains harder, here). The combination is trendy these days, as this week will see the launch of a new initiative in France with the French chapter of ACM SIGOPS (<a href="http://www.sigops-france.fr/Main/Journee-NFC-SSO" class="liexternal">in French</a>). I won&#8217;t be there, sadly, but I hope to get some feedback from this event.</p>
<p>So, about the Internet of Things, as suggested by <a href="https://twitter.com/tcarlyle" class="liexternal">@tcarlyle</a>, I looked at <a href="http://www.evrythng.com/" class="liexternal">Everythng</a>. I really liked it, and their basic engine is very interesting. What they are doing in the social area is interesting, as they take a fresh look at advertising (with <a href="http://blogs.hbr.org/cs/2013/03/advertising_and_the_internet_o.html" class="liexternal">real interaction</a>). Their offer is definitely worth looking at if you want to do something with objects. And the fact that they are looking in parallel at smart and &#8220;dumb&#8221; objects makes their initiative even more appealing.</p>
<p>However, I still get the feeling that there is a strong interest in going one step further, really exploring VRM here. For instance, on approach like <a href="http://onecub.com" class="liexternal">Onecub</a>, which helps users organize and manage their incoming e-mails from retailers and service providers, sounds really interesting. This kind of engine, connected to Everythng&#8217;s &#8220;thing&#8221; engine, could efficiently link the Internet of People with the Internet of Things, because we certainly don&#8217;t want to get unfiltered messages from all the things we know (and their makers/vendors/distributors). By the way, <a href="https://twitter.com/Onecub" class="liexternal">@Onecub</a>, I would love to take a look at your private beta.</p>
<p>In the end, it looks more and more that some experimentation will be possible without necessarily having to go through too much of  a backend effort, building on these upcoming technologies. Which brings me to the implementation side, with NFC. I have tried a few applications that perform actions when scanning tags.</p>
<p>The first one I tried was Tagstand&#8217;s <a href="https://play.google.com/store/apps/details?id=com.jwsoft.nfcactionlauncher&#038;hl=en" class="liexternal">NFC Tag Launcher</a>. This application seems to work nicely, but it requires to use their own tags (they supposedly ship some free, but only in the US). I did try it anyway, because their application can also perform some actions when connecting to a Bluetooth device or to a Wifi network. That&#8217;s actually interesting, as such events can happen when arriving in the car or at home. For me, turning my phone&#8217;s loud ringtone on automatically when I get home is useful.</p>
<p>The second one I tried was <a href="https://play.google.com/store/apps/details?id=com.widgapp.NFC_ReTAG_FREE&#038;hl=en" class="liexternal">NFC ReTAG Free</a>. This app does about the same thing as the previous one, but it can do it with any NFC tag, including my old conference badges (and I have enough of these to organize quite a few experiments). This application works fine, and I have been able to associate some behavior to old badges. Sadly, in practice, the app is made less interesting by Android&#8217;s design choices when several NFC applications are available. Like in other cases, a chooser is displayed, that allows me to choose in a single click between the various tag-reading applications. However, this chooser does not include an option that allows me to make a permanent choice: a chooser is displayed every time.</p>
<p>If I try to second guess Google&#8217;s intentions, I would say that they simply want to avoid applications that would hijack all NFC interactions. However, Google also describes the main value of NFC as the streamlining of the interaction: you read a tag, and you immediately get what you want. In that particular case, this value falls as a collateral damage to another policy.</p>
<p>If we dig a bit deeper, this shows that the preferred model for Android NFC is a closed model, in which an application is associated to a set of tags, issued by the same company. In that case, they will use private NDEF content, which guarantees them that their tags will trigger their applications. Open models, in which a tag can be used freely by several applications (letting a user select a preferred app) is more difficult. I still believe that such applications are very promising for NFC, in particular in publc spaces, but the interaction may not be as fluid, at least to start with.</p>
<p>Now that the Layar app is reading <a href="http://www.layar.com/blog/2013/03/05/qr-codes-in-layar-yes/" class="liexternal">QR-codes</a>, we can see how similar applications may rapidly become the front-end to our smartphones, and NFC tags will be losing some of their competitive advantage if they can&#8217;t trigger this app automatically. Let&#8217;s hope that this feature will keep evolve in future releases of Android.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2013/03/27/experimenting-nfc-things/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>NFC Tags to Empower Users in The Internet of Everything Else</title>
		<link>https://javacard.vetilles.com/2013/03/06/nfc-tags-to-empower-users-in-the-internet-of-everything-else/</link>
		<comments>https://javacard.vetilles.com/2013/03/06/nfc-tags-to-empower-users-in-the-internet-of-everything-else/#comments</comments>
		<pubDate>Wed, 06 Mar 2013 20:46:25 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[User-centric]]></category>
		<category><![CDATA[VRM]]></category>
		<category><![CDATA[NFC]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=861</guid>
		<description><![CDATA[Here is a continuation to my ramblings about the solely private use of NFC tags. I have already mentioned that there would be many benefits in considering some tags as public goods, and now, I wll focus on tags to be associated to things, as owned by companies or individuals. I have pompously called this [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Here is a continuation to my ramblings about the solely private use of NFC tags. I have already mentioned that there would be many benefits in considering some <a href="http://javacard.vetilles.com/2013/03/06/nfc-tags-as-public-goods/" class="liinternal">tags as public goods</a>, and now, I wll focus on tags to be associated to things, as owned by companies or individuals. I have pompously called this the <em>Internet of Everything Else</em>, because all current Internet of Things products and frameworks focus only on the things to come, forgetting all objects that already exist or that are not that easily connectable.</p>
<p>Like public tags, there is a strong interest here to have a generic Web platform to handle such thing tags, which would need to follow some basic principles:</p>
<ul>
<li>Be thing-centric. The tag must be primarily associated to the thing, whatever it is, and it should be able to provide information about that thing (<em>e.g.</em>, link to user manuals, warranty information). On the opposite, the tag should not solely be a direct marketing fixture for the thing&#8217;s manufacturer and/or distributor.</li>
<li>Give power to the thing&#8217;s owner and users. The tag is associated to something, this thing is owned by someone, and that person need to have control over the tag. Except from the core thing information mentioned above, the owner should have control on what they want the tag to do. If I want to use the tag conveniently placed on my coffee machine to launch my e-mail every morning, I should be able to do so, as long as I still have a way to access the other information associated to the tag when I want to. And if my daughter wants the same tag to trigger some other default action when she scans it, it&#8217;s fine too.</li>
</ul>
<p>If we combine these two items, we get to an interesting <a href="http://en.wikipedia.org/wiki/Vendor_relationship_management" rel="nofollow" class="liwikipedia">VRM</a> idea: the tag on the thing is the link between the thing&#8217;s owner/user and any businesses that may be linked to it, and the user keeps some control:</p>
<ul>
<li>The user/owner can contact the businesses if required.</li>
<li>The businesses associated to the thing can contact the thing&#8217;s owner, only as authorized by the owner.</li>
<li>The owner of a thing can transfer the ownership to another individual, who then becomes the contact for the businesses.</li>
</ul>
<p>In a world where objects often have a lifecycle involving several individuals, this is a great way for businesses to keep in touch with the actual user of their products, while providing more control to the end users. Like usual, I strongly believe that this interaction strategy is likely to have better returns for businesses than basic &#8220;advertising push&#8221; strategies. And the service to users is real, even if it is limited to providing access to information related to their things.</p>
<p>Once again, I haven&#8217;t found anyone doing something even remotely similar to this among all the NFC companies that are popping up everywhere. If you are doing this or know someone who is doing it, please comment on this; I would love to take a look.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2013/03/06/nfc-tags-to-empower-users-in-the-internet-of-everything-else/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>NFC tags as Public Goods</title>
		<link>https://javacard.vetilles.com/2013/03/06/nfc-tags-as-public-goods/</link>
		<comments>https://javacard.vetilles.com/2013/03/06/nfc-tags-as-public-goods/#comments</comments>
		<pubDate>Wed, 06 Mar 2013 17:28:58 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[NFC]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=853</guid>
		<description><![CDATA[I have now seen a number of NFC applications, and they all have something in common: they consider their tags as a private and exclusive property. They believe that they will be the only application using this tag. That may be true in some cases, where tags are deployed inside the premises of a company [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I have now seen a number of NFC applications, and they all have something in common: they consider <em>their</em> tags as a private and exclusive property. They believe that they will be the only application using this tag. That may be true in some cases, where tags are deployed inside the premises of a company (think of tags to be scanned by security guards  on every round, for instance). But in most cases, tags can hardly be considered as a private good. Let&#8217;s consider a few examples:</p>
<ul>
<li>A mailbox tag. La Poste and Connecthings put tags on <a href="http://www.nfcworld.com/2011/12/19/312063/paris-gets-interactive-nfc-mailboxes/" class="liexternal">mailboxes</a>. So far, they have equipped the mailboxes in the streets of Paris, which are a property of La Poste. But what if they want to extend to private mailboxes? We can think of many applications, but many of them don&#8217;t belong to La Poste. Maybe that DHL or UPS would also like to use a mailbox tag?</li>
<li>Tourist tags. Many cities have deployed NFC tags that allow tourists to get information about the site they are  visiting. This is a very nice application, providing content to the public. Of course, we can imagine many uses for such tags beyond that: a trivial one would be to provide alternative information, for a more focused public; we could also imagine a city-wide multiplayer games, reusing these tags.</li>
</ul>
<p>There are two main reasons that make these tags public goods:</p>
<ul>
<li>First, they are in a public space, accessible to many, and it is reasonable to expect that different people will expect different effects when scanning the same tag.</li>
<li>Second, it doesn&#8217;t sound reasonable to use many tags for the same thing/location. The private mailbox example is the best here: having one NFC tag is acceptable, even for people who don&#8217;t plan to use it; having one for each delivery company is simply not acceptable.</li>
</ul>
<p>The next question is: How to get there? Well, there are many possible ways, possibly complementary, and I will outline three:</p>
<ul>
<li>Design applications to use the content of a tag as identifier. Many private applications already do that today; the content of the tag simply is an index into their Web site, giving them some flexibility about the content to associate to each tag.</li>
<li>Define a Web platform that will associate information about tags to user-selected mobile applications. That is the crucial part here. Once we have some kind of global identifier for tags, the next step is to asscoaite each tag to content. In a dream world, this aggregator role should be assumed by some kind of Google-like indexing company. Then, depending on the user&#8217;s preferences, scanning a tag would yield different results, as we don&#8217;t all want to do the same thing.</li>
<li>Standardize a significant number of tag content, to make them available to many applications. In some cases, offline content can also be very useful, if it is standardized. For instance, location information can be a nice complement to a tourist tag, together with some canonical name to identify the location (chosen by the entity that installs the tag).</li>
</ul>
<p>In such a context, the main value of a tag is to contain a small amount of verified, unambiguous information, which can then be used to link to more information (public or private), and/or to link it to applications. Here, considering tags as a public good, allows us to maximize the value that can be associated to them, and to provide more valuable services to users/citizens.</p>
<p>The missing link is here the open Web platform. I am still surprised today that I haven&#8217;t been able to find such a platform; if you know one, please let me know.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2013/03/06/nfc-tags-as-public-goods/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>POPWings is a cool business card, but where is the platform?</title>
		<link>https://javacard.vetilles.com/2013/01/31/popwings-is-a-cool-business-card-but-where-is-the-platform/</link>
		<comments>https://javacard.vetilles.com/2013/01/31/popwings-is-a-cool-business-card-but-where-is-the-platform/#comments</comments>
		<pubDate>Thu, 31 Jan 2013 17:50:54 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[NFC]]></category>
		<category><![CDATA[POPWings]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=850</guid>
		<description><![CDATA[UPDATED March 1st, 2013: See follow-up article. I have been quite happy to hear a few weeks ago that Gemalto finally decided to consider NFC as more than secure services, by launching their POPWings service. I immediately ordered one of their business cards, excited to get a new NFC service. So, I got a card [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>UPDATED March 1st, 2013: See <a href="http://javacard.vetilles.com/2013/03/01/popwings-again-after-mwc/" class="liinternal">follow-up article</a>.</p>
<p>I have been quite happy to hear a few weeks ago that Gemalto finally decided to consider NFC as more than secure services, by launching their <a href="http://www.popwings.me/" class="liexternal">POPWings</a> service. I immediately ordered one of their business cards, excited to get a new NFC service.</p>
<p>So, I got a card with my blogger identity, and I scanned it with my Nexus S. This opened my Popwings page in the browser, showing my information. I was even able to link directly to my blog, open Twitter on my feed, everything was fine for a Web part.</p>
<p>Next step: download the application from the Play store. I just did that, and I have to admit that the feeling was not the same. I expected the application to do more than the simple link, and as far as I know, it doesn&#8217;t. OK, it will store locally my POPWings contacts, instead of showing them one by one. But as soon as I open this application, I am stuck in POPWings world. <del datetime="2013-03-01T13:35:54+00:00">In particular, what hurts most is the inability to add this contact to my phone&#8217;s contacts. Let me be clear on this: it took me forever to get a contact database that will synchronize between my different accounts, and I definitely don&#8217;t want to change that</del>.</p>
<p><del datetime="2013-03-01T13:35:54+00:00">It looks that POPWings is trying to deal with customers the Apple way: first, you buy a product from us, and then you are stuck in our ecosystem. That kinda works for Apple: I just got an iPod that I love as a device, but I hate Apple&#8217;s dysfunctional Windows software (disclosure: I am an Amazon fanboy for music, including the cloud player, and the primary reason for getting an iPod is the ultra lightweight form factor).</del></p>
<p><del datetime="2013-03-01T13:35:54+00:00">The problem with Popwings is not in the application, but in the philosophy behind it: it limits me rather than empowering me. I bought a new-generation business card, and what I got is a contactless smart card with my name on it, that doesn&#8217;t even work as a standard business card, since my contacts can&#8217;t easily put its content in their list of contacts.</del></p>
<p>UPDATED: Although the application is more open than I initially experienced, it still attempts to create a new and private ecosystem, which doesn&#8217;t seem to be the way to go. More on this <a href="http://javacard.vetilles.com/2013/03/01/popwings-again-after-mwc/" class="liinternal">in the update</a>.</p>
<p>As you may have guessed, I wouldn&#8217;t bet on Popwings today, especially With the current application. Nevertheless, the idea remains good, and I would love to see it turn into a wildly successful ventures. Here are some suggestions:</p>
<ul>
<li><b>Market to the end-user.</b> Actually, Popwings got this one right: adoption will come to end-users, and the best way to force ourselves into making useful NFC applications is the need to convince them to buy our product.</li>
<li><b>Don&#8217;t lock the end-user.</b> This is where Popwings fails. It would be so much better if it allowed me to add a contact to my contact list, or to interface it with other applications: the more, the merrier.</li>
<li><b>Encourage new uses.</b> This is where Popwings can become a platform more than a mere application. By encouraging others to develop applications that leverage Popwings business cards or to integrate Popwings cards in their application, these NFC business cards can become a <em>de facto</em> standard, unlocking a huge market.</li>
<li><b>Focus on the platform, not the app.</b> A first-year student can write can write the Popwings app, but it takes slghtly more effort to build a platform that correctly manages NFC business cards or other cards for use in Web/mobile applications.</li>
</ul>
<p>My 2 cents.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2013/01/31/popwings-is-a-cool-business-card-but-where-is-the-platform/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip to Cloud, day 2: NFC authentication in the cloud</title>
		<link>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-nfc-authentication-in-the-cloud/</link>
		<comments>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-nfc-authentication-in-the-cloud/#comments</comments>
		<pubDate>Thu, 20 Sep 2012 10:15:51 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[NFC]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-nfc-authentication-in-the-cloud/</guid>
		<description><![CDATA[This is a presentation from Gemalto&#8217;s Maurizio Divona, delivered by her colleague Virgine Galindo. It starts from cloud authentication, where strong authentication typically happens with tokens that need to be distributed by service providers. The idea is of course to use NFC technology to simplify this, which would allow the use of strong authentication in [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This is a presentation from Gemalto&#8217;s Maurizio Divona, delivered by her colleague Virgine Galindo. It starts from cloud authentication, where strong authentication typically happens with tokens that need to be distributed by service providers.</p>
<p>The idea is of course to use NFC technology to simplify this, which would allow the use of strong authentication in more situations. The idea is here to have credentials in mobile phone applications, and to use it in a NFC transaction with a PC. Here, the service provider delivers a user credential in the phone, or delegates this to a TSM. Because the credential will be stored in the secure element, it is possible to emulate all kinds of hardware tokens on the mobile phone, with a similar security level.</p>
<p>This is an interesting way to introduce new applications in the NFC secure element, especially ifhy can make our lives easier.  Of course, this assumes that there actually is an infrastructure ready for downloading content to it, and business models in place to actually get the credentials in an efficient way to the secure element. So, some way to go here.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-nfc-authentication-in-the-cloud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip to Cloud, day 1: Now, cloud TSM</title>
		<link>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-now-cloud-tsm/</link>
		<comments>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-now-cloud-tsm/#comments</comments>
		<pubDate>Wed, 19 Sep 2012 13:21:19 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[NFC]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-now-cloud-tsm/</guid>
		<description><![CDATA[A presentation by Thian Yee, from Cassis (a Safran Morpho company). TSMs are moving from 1-1 relationships to n-n relationships. The challenges they face are related to customer experience, which must be very simple and consistent; flexibility and scalability, as demand is very variable, depending on product launches, with unsustainable peak demand; and finally, regulatory [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>A presentation by Thian Yee, from Cassis (a Safran Morpho company). TSMs are moving from 1-1 relationships to n-n relationships. The challenges they face are related to customer experience, which must be very simple and consistent; flexibility and scalability, as demand is very variable, depending on product launches, with unsustainable peak demand; and finally, regulatory requirements, time-to-market and cost.</p>
<p>Cassis is now trying to offer TaaS (TSM as a service, of course), where the TSM performs the essential processing, and also streamlines it, for instance by leaving the most sensitive data at the bank, and only sending crypto requests to the bank.</p>
<p>In the future, they envision many TSMs in the cloud, where collaboration will be made easier. Of course, there are things to consider to make that happen, including of course some action on regulatory bodies, who maynnot like this move to an uncontrolled cloud.</p>
<p>I have always thought that this kind of activity was difficult today, because cloud is about elasticity, and Hardware Security Modules (typically used by TSMs to store sensitive data) are not all that elastic. Of course, proposing to keep the sensitive data on the bank&#8217;s server is one way to address that, but it also shifts some responsibility from the TSM back to its customer, which is a bit strange.</p>
<p>Nevertheless, I get this feeling that a TSM cloud needs to be really secure. This would eiher mean that someone builds a TSM cloud and shares it with others (Gemalto, do you want to be the Amazon of TSMs?), or that someone builds a cloud for secure applications, possibly beyond TSM. I am sure that there are other reasons to use a secure cloud, so this may be the way. Anyway, this is interesting to follow, because leveraging the cloud&#8217;s properties will give a competitive edge to any TSM.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-now-cloud-tsm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hijacking NFC Tags</title>
		<link>https://javacard.vetilles.com/2011/10/05/hijacking-nfc-tags/</link>
		<comments>https://javacard.vetilles.com/2011/10/05/hijacking-nfc-tags/#comments</comments>
		<pubDate>Wed, 05 Oct 2011 08:33:53 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Discussions]]></category>
		<category><![CDATA[NFC]]></category>
		<category><![CDATA[tag]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=748</guid>
		<description><![CDATA[I have been thinking about tags for as a background task for a while, and one of my directions has been to look at the &#8220;hijacking&#8221; of tags. Here, I am not talking of replacing some tags by other tags (for instance pushing toward a competitor of a smart poster&#8217;s rightfful owner), as thie defnitely [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I have been thinking about tags for as a background task for a while, and one of my directions has been to look at the &#8220;hijacking&#8221; of tags. Here, I am not talking of replacing some tags by other tags (for instance pushing toward a competitor of a smart poster&#8217;s rightfful owner), as thie defnitely doesn&#8217;t look like something legit.</p>
<p>Here, the idea is about developing an application that would run on NFC-enabled phone, and that would catch all NFC tag traffic, proposing whatever action the tag was meant to propose, but also proposing alternatives. Here are a few potential uses for it:</p>
<ul>
<li>Propose alternative opinions. For instance, let&#8217;s imagine that a Google tag on a restaurant window redirects you straight to Zagat. This application may offer you some alternatives, like Michelin or Yelp.</li>
<li>Do something else with the tag. For instance, a tag installed by a city on a monument to provide tourist information could be used in an interaactive game. When the user scans the tag, something happens (for instance, some additional information is disclosed).</li>
</ul>
<p>There may be a business model behind such an application, but we must remember that the title of this post include the term &#8220;hijack&#8221;. Using somebody else&#8217;s infrastructure that is left in the open may be acceptable/legal/moral, but if we go too far, I am sure that some countermeasures can be put in place. However, this sounds like an interesting non-commercial project. Here is how I see it:</p>
<ul>
<li>Community project. The open community is required in order to create the alternative content. Without content, this mombile application simply is another indirection when using tags, which is not good.</li>
<li>Linked to other community projects. An obvious link is Wikipedia, which could provide alternative content for all kinds of monuments, public places, <em>etc</em>. But I am sure that there are other projects to draw from. The good thing about this is that it reduces the production of content to linking tags to new URL&#8217;s, which can be much faster than writing the content.</li>
<li>An experiment with tags. What people do with tags today is very boring, and we are expecting more ideas to come. Such a project could be tthe base of a wider experiment based on tags.</li>
</ul>
<p>I am not good at starting/managing developer communities, and I will soon have little time to do this. I have thought about a few things around this, that I would be happy to share with people interested to work on this, but my meager Web development skills have stopped me from starting a real implementation. This thing just sounds like a very nice group project on Mobile Web, with a mobile client, a Web site and database, a sprinkle of NFC for the hype, and much more later. If you&#8217;re interested, please drop me a line, as I would like to keep a (distant) eye on such a project.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2011/10/05/hijacking-nfc-tags/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>GoogleIO suggestions for new NFC apps</title>
		<link>https://javacard.vetilles.com/2011/05/11/googleio-suggestions-for-new-nfc-apps/</link>
		<comments>https://javacard.vetilles.com/2011/05/11/googleio-suggestions-for-new-nfc-apps/#comments</comments>
		<pubDate>Wed, 11 May 2011 16:26:21 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[NFC]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=729</guid>
		<description><![CDATA[GoogleIO is happening right now in San Francisco. On the agenda, there has been (only?) one talk on NFC in the Android track. During this talk, the speakers gave an introduction to NFC technology, but for someone who knows the basics on NFC, the most interesting parts were the demos, showing interesting NFC applications. But [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>GoogleIO is happening right now in San Francisco. On the agenda, there has been (only?) one talk on NFC  in the Android track. During <a href="http://www.youtube.com/watch?v=49L7z3rxz4Q" class="liexternal">this talk</a>, the speakers gave an introduction to NFC technology, but for someone who knows the basics on NFC, the most interesting parts were the demos, showing interesting NFC applications.</p>
<p>But first, let&#8217;s see what they have to say about the characteristics of NFC. I kinda like their presentation of things:</p>
<ul>
<li><strong>Low friction. The main advantage that they have been advertising. The idea is here that when you scan a NFC tag, the appropriate application is instantly launched, which is a much better user experience than using QR-codes.<strong></li>
<li><strong>Low range.<strong> Some good, and some bad. On the good side, the low range is a security guarantee: in order to start a NFC exchange, an attacker will need to be uncomfortably close to his victim. On the bad side, if you want to do something, NFC will be used to bootstrap, but another wireless connection (Bluetooth, WiFi) will need to be set up.</li>
<li><strong>Low data rate. Not good, and another reason to switch to another wireless connection after bootstrap.<strong></li>
</ul>
<p>So, in Google IO, the main message is that NFC has &#8220;low friction&#8221; and allows developers to instantly start their application, based on a contextual information (a NDEF tag, or another phone in P2P mode). The examples for tags were basic but demonstrative, as they actually triggered an action (or at least, they tried to, because as usual in big conferences, network was a problem).</p>
<p>The P2P examples were even more demonstrative. The most basic one used NFC in a gaming environment: (1) take two phones on which the same 2-player application is installed, (2) start the application on one, (3) move the second phone in NFC range. Then, the magic occurs: the application is started on the second phone, and a Bluetooth connection is setup. The players can now start a new game and play. Now, that&#8217;s user experience.</p>
<p>This concept can then be extended, and this will actually happen in the next release (dubbed Ice Cream Sandwich, one of my favorite American junk foods). Then, some of the core applications will be NFC-enabled. For instance, to share a contact, simply open the contact, and have the recipient put his phone in range: the contact goes to the other phone. Same thing to exchange a URL, to confirm an appointment, or a few more things. Very impressive indeed, and for me, a whole new set of applications for NFC.</p>
<p>I kept one for the end. If we reconsider the gaming example, but the second player does not have the application installed, what will happen? He will be forwarded to Android Market, of course, to purchase the application. This just works.</p>
<p>Google even gets a reward for this: since both people exchanging data on a P2P NFC connection are likely to be connected to their Google account, such recommendations are really easy to track, or even to reward. More information for the Google database.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2011/05/11/googleio-suggestions-for-new-nfc-apps/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Q&amp;A: What do NFC NDEF Signature records bring?</title>
		<link>https://javacard.vetilles.com/2011/02/07/qa-what-do-nfc-ndef-signature-records-bring/</link>
		<comments>https://javacard.vetilles.com/2011/02/07/qa-what-do-nfc-ndef-signature-records-bring/#comments</comments>
		<pubDate>Mon, 07 Feb 2011 12:57:01 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Q&A]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[NFC]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=696</guid>
		<description><![CDATA[Here is another question related to NFC, this time about what I understand of NDEF signatures (could be incomplete). The NFC Forum has recently added the possibility to include a signature record in tags. Adding such a signature can be used to ensure that the content of the tag (say, a URL) has been written [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Here is another question related to NFC, this time about what I understand of NDEF signatures (could be incomplete).</p>
<p>The NFC Forum has recently added the possibility to include a signature record in tags. Adding such a signature can be used to ensure that the content of the tag (say, a URL) has been  written by the person who sign it, and not modified afterwards. OK, so what does such a signature really bring in terms of security?</p>
<p>Well, I must admit that I am not really sure. Of course, one of the reasons is that I am yet to see a phone that verifies these signatures; I may also not have all the information. So far, I have read the NDEF spec, and the <a href="http://web.it.kth.se/~johanmon/theses/kilas.pdf" class="lipdf">thesis</a> by Markus KilÃ¥s on this topic.  So, let&#8217;s say that this entry will get modified at some point.</p>
<p>Let&#8217;s continue with the URL example, on a very simple, innocuous example: a tag in Nice that contains a URL pointing to explanations about the Ste-Reparate Cathedral. If this tag is signed, then we can expect that a mobile phone would verify the signature before to forward the URL to the browser. However, the mobile phone would also be able to read unsigned tags.</p>
<p>Let&#8217;s now consider the two main attacks on this kind of tags:</p>
<ul>
<li><strong>Cloning</strong>. The entire record can be read freely, so a signature doesn&#8217;t protect at all against cloning. A Nice supporter may be able to put a Ste-Reparate tag on a Notre-Dame de Paris  poster.</li>
<li><strong>Tag replacement</strong>. The signature does not protect against this. If a Paris supporter comes to Nice, removes the Ste-Reparate tag and replaces it with a Notre-Dame de Paris tag, this will work with a browser. Of course, the phone may display a small &#8220;Trusted&#8221; icon for a recognized signature, but unless all tags rapidly become signed, I doubt that users will notice this icon any time soon.</li>
</ul>
<p>So, my conclusion is that signatures are likely to be useless for this URL use case, at least before the industry reaches a global agreement on a way to define how signatures should be handled on phones.</p>
<p>Of course, signatures may still be very useful in proprietary applications, which may be used in the industry. In such cases, the signatures will be verified by a specific application. In that case, it would solve part of the tag replacement attacks, since it would mean that a tag from a given company could only be replaced by another tag from the same company (or a clone of it). This means that a good level of tamper-evidence will also be required.</p>
<p>Not really good looking so far, but if I have missed something, I would be really glad to update this to something more positive.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2011/02/07/qa-what-do-nfc-ndef-signature-records-bring/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Schmidt on Android and NFC: A dream come true</title>
		<link>https://javacard.vetilles.com/2010/11/16/schmidt-on-android-and-nfc-a-dream-come-true/</link>
		<comments>https://javacard.vetilles.com/2010/11/16/schmidt-on-android-and-nfc-a-dream-come-true/#comments</comments>
		<pubDate>Tue, 16 Nov 2010 16:13:08 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[mobile payment]]></category>
		<category><![CDATA[NFC]]></category>
		<category><![CDATA[VRM]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=648</guid>
		<description><![CDATA[Yesterday, at the Web 2.0 Summit, Eric Schmidt started his &#8220;discussion&#8221; with Tim O&#8217;Reilly and John Battelle by Android and NFC. And what he said about the technology is like a dream for many NFC stakeholders, who have been waiting for signals from big players. First, the upcoming Nexus S will support NFC. This is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Yesterday, at the Web 2.0 Summit, Eric Schmidt started his &#8220;<a href="http://www.youtube.com/watch?v=AKOWK2dR4Dg&#038;p=2737D508F656CCF8" class="liexternal">discussion</a>&#8221; with Tim O&#8217;Reilly and John Battelle by Android and NFC. And what he said about the technology is like a dream for many NFC stakeholders, who have been waiting for signals from big players.</p>
<p>First, the upcoming Nexus S will support NFC. This is big, because one of Google&#8217;s objectives (the main one?) with Nexus phones is to provide a reference design for Android devices. And now, NFC is part of that reference design (and of Gingerbread, Android&#8217;s upcoming release).</p>
<p>Then, Eric Schmidt talked about NFC. He started by a tag reading demo; of course, it didn&#8217;t work, because the network was too slow (typical in such environments). He gave a little description, and then switched to contactless payments, even mentioning the use of a secure element. Now, that was nice: Google is not only thinking about reading tags.</p>
<p>Later in his speech, he mentioned how the combination of location-aware, tag reading and mobile payment could change the way commerce works, using terms that would have been largely appreciated at a NFC conference.</p>
<p>To please me even more, he even threw in a mention of voluntarily provided information, which is of course limited by the fact that Google is an unlikely VRM supporter. But yes, if the system is able to integrate that I am actually looking for a new pair of pants, it may provide me with very useful information.</p>
<p>Finally, Eric Schmidt went as far as mentioning security several times, and even saying that &#8220;the technology has to be secure,&#8221; which is nice to hear for many of my colleagues. And his reason is rather simple: there is money involved directly, so security is a must.</p>
<p>One of the best parts of his vision is to remind us that mobile is personal, secure, and an aggregating technology. So when we think about what we can do with NFC or whatever we add to that, we need to figure out what it brings to the big picture, and how the technology can best be used with all the other mobile technologies.</p>
<p>OK. Enough ramblings. Here is an approximative transcript of what he said about Android (a bit raw, so if you have 10 minutes to spare, take a look at <a href="http://www.youtube.com/watch?v=AKOWK2dR4Dg&#038;p=2737D508F656CCF8" class="liexternal">the video</a>):</p>
<p><strong>Q</strong>: <em>There has been a lot of talk about a new operating system aligned with a potential hardware device, coming from Google. We&#8217;d love to see it if that was possible.</em></p>
<p><strong>ES</strong>: OK. How about instead a demonstration of some software.? So, I happen to have here an unannounced product that I carry around with me. That is an Android device, and we have taped over its origin.</p>
<p> You see, this is a placemark [showing a placemark panel, obviously with a tag in it]. The neat thing you could do with this new technology called NFC (which stands for Near Field Communication), and we think that Android should support that. It&#8217;s been around for a while, by the way.What you do is, these are chips that are embedded in things, eventually in clothes to prevent people from stealing. These chips are senders, and we are incorporating support for the reader-writer, so the way it works is you turn this thing on and you basically just tap like that, and it tells you, in the particular case, where you are.</p>
<p>What&#8217;s neat about the NFC chip is that the whole notion of location takes an entirely new meaning, because now I can just tap, I don&#8217;t have to take a picture, I don&#8217;t have to scan a barcode.</p>
<p><strong>Q</strong>: <em>So this is basically gonna be in presumably many of the new Android phones.</em></p>
<p><strong>ES</strong>:  It&#8217;s actually gonna be in the new operating system called Gingerbread that comes out in the next few weeks. So we think that the overall mobile market, which is already extraordinarily excited about these payment systems, will benefit from having those, because it is a secure element, and the secure element really is very hard to steal if you will.</p>
<p><strong>Q</strong>:  <em>So, the secure element allow you basically to do payment.</em></p>
<p><strong>ES</strong>: One way to think about this is that is that it will replace your credit card. The term of the industry is called tap and pay. The theory of the case is that you will be able to take these mobile devices from everybody, to walk into stores, do commerce, you&#8217;ll be able to figure out where you are, again, with your permission, all that kind of stuff.</p>
<p><strong>Q</strong>: <em>Effectively, bump for everything.</em></p>
<p><strong>ES</strong>:  Yes, bump for everything, and eventually, replace credit cards.</p>
<p><strong>Q</strong>: <em>It also turns the phone into a much more powerful form of identification.</em></p>
<p><strong>ES</strong>: It&#8217;s an example of what I have talked about for a while, which is &#8220;mobile first&#8221;. I don&#8217;t think that people understood how much more powerful these mobile devices are going to be than the desktops. You think of the desktop machine as having all this power and tremendous network, beautiful screen, but because these things are so highly personal, and because they are location aware, â€¦</p>
<p><strong>Q</strong>: <em>They also have network</em></p>
<p><strong>ES</strong>: Yes, with LTE networks coming  to the United States, first in the world, for a change, roughly in January-February around the country,  it is a really really god day for mobile.</p>
<p><strong>Q</strong>: <em>With the theme of points of control, it strikes us that one of the points of control is having tons and tons of credit card numbers; Amazon has tons, Paypal has tons, Apple has a lot. Combined with this kind of technology, it strikes me that it could possibly change the game. Do you agree with that, and where does Google stand with that.</em></p>
<p><strong>ES</strong>: Well, we see ourselves as a technology provider in this, we&#8217;re not trying to compete in those spaces, but ultimately this technology is personal, it&#8217;s secure, and it&#8217;s an aggregating technology. So it makes sense that you put everything in it and carry it around. It has to be secure, because it&#8217;s obviously going to be used as money repository.</p>
<p><strong>Q</strong>:  <em>But still, if you are doing payment, somebody is doing the payment processing.</em></p>
<p><strong>ES</strong>: There are industrial partners for all the initiatives in the industry, with very sophisticated payment processors, and regulations, and all </p>
<p><strong>Q</strong>: <em>You expect to be a partner there rather than â€¦</em></p>
<p><strong>ES</strong>: Absolutely. </p>
<p><strong>Q</strong>: <em>But you do have Google checkout.</em> </p>
<p><strong>ES</strong>: Remember, Google checkout is just a piece of this. Payment processors do something different. They actually deal with the merchants, moving the money around, you know with fraud and so forth. The reason why this NFC dhip is so interesting is because the credit card industry thinks that the loss rate is going to be much better, because they are fundamentally more secure. And ultimately, the money that brings us all to this wonderful venue comes out of commerce in one way or another; advertising in Google&#8217;s case. My guessis that there will be 500 new startups in the mobile payment space as these platforms emerge, with all these new and interesting things that we can do.</p>
<p><strong>Q</strong>: <em>What I&#8217;ve been fascinating by is the idea that this is gonna change is shorten the loop between the search and acquisition of a product. Right now, we see this in buying an app: you search for the app and then you buy it on the phone. But this really makes it possible in the real world. You can search for something, and â€¦</em></p>
<p><strong>ES</strong>: But, forget search. Well, I shouldn&#8217;t exactl say that, but that&#8217;s a joke. Imagine I am walking down the street, and instead of typing my search, my phone is giving me information all the time, and it happens to know that I need new pants or something. You can imagine all sorts of linkages between autonomous search, and location-based search, where you are, where your favorite stores are, what your preferences are, again if you opt in to these situations. Its likely to drive a very very large mobile commerce business and mobile e-commerce business.  And the scale of commerce is 14 trillion dollars, which is the global GDP,  so some large amount of money is to be gotten in these new platforms over time.</p>
<p><strong>Q</strong>: <em>And you can really how this could be a fabulous tie with groupon, because it tells you that there is a crowdsourced offer.</em></p>
<p><strong>ES</strong>: Again, if you look at groupon as a very good example of a very very successful local merchant, they today use e-mail as their primary acquisition mechanism, but they have competitors which are using other techniques. What we know is that people like a deal.</p>
<p><strong>Q</strong>: <em>One last question on Android. What are you dissatisfied about with regard to the platform, and what do you think need to be fixed, if anything.</em></p>
<p><strong>ES</strong>:  You score Android against the historically leader in the space, which is the iPhone, and I do this as a proud former board member of the Apple world. There is a set of things that the iPhone really did a brilliant job of bringing out in a closed system. Brilliant design, the app store, the platform and so on. So most people judge Android by how we are doing relative to that. And it&#8217;s clear that from a reach, choice, and so forth, we are in great shape. The next real focus is at the applications layer. So I think that if I want to be critical, I would have liked to put more emphasis on the application side earlier. It&#8217;s hard, because remember, the application decisions are made based on developers, who do it based on volume.  So you have to establish volume first, which is something that I think we have done with Android. And for all of these players at the third-party level, and again I know that we have a lot of developers here in the audience, it&#8217;s fundamentally about the math of the platform.  So we understand platforms very well, we think that Android will be, if not the leading platform, a leading platform.</p>
<p><strong>Q</strong>: <em>That brings up a question that I have been thinking about. As there are more and more applications, it becomes a search problem to figure out which one to choose, and that&#8217;s one of your sweet spots. But you don&#8217;t have some of the same mechanisms  for identifying the best apps. How are you thinking about search as a competitive advantage as the application space grows, where the Android Market is the Google of the app space?</em></p>
<p><strong>ES</strong>: We don&#8217;t think of it as a competitive edge, we just try to do it better, and the competitive environment will win. As a comment, I think people are obsessed with the competitive landscape, where what they should really be focusing on is how much bigger the market is getting. And because it&#8217;s, including the leadership that you guys did with Web 2.0 so many years ago, this is a very large universe, that is getting much larger very quickly, bringing more and more people into it. So the competition is healthy, what&#8217;s really happening is you&#8217;re growing the market. So with respect to the applications and application search, there&#8217;s all sorts of interesting ways of doing that; Admob, for instance, is doing on the order of a billion ad impressions a day now, and that kind of information, in theory, is useful as part of a search problem, because ads have a real value, and we really believe that.  There are many many ways in which the information people are using, usage patterns, can be used to provide better choices. But you&#8217;re correct that these markets tend to overcorrect; They have millions of apps, whatever, but then ultimately, the leaders emerge. </p>
<p><strong>Q</strong>: <em>One of the things that Steve and Apple did right is the about divorce from the carriers, the ability to pretty much say: I don&#8217;t want your stuff on my phone. Do you think that Android is ever going to be truly free of that â€¦</em></p>
<p><strong>ES</strong>: I certainly hope so, in the sense that the Android model is different from the Apple model, very distinctly on pretty much every point. It&#8217;s open system vs. Closed system, and closed systems have their advantages, and open systems have their advantages. Google made a bet on open systems. We are willong to let the vendors, the carriers, and so forth, set their pricing, set their distribution terms, and so forth. I think that &#8216;s the right model. </p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/11/16/schmidt-on-android-and-nfc-a-dream-come-true/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
