This article contains promotional content .(March 2023) |
MIFARE is a series of integrated circuit (IC) chips used in contactless smart cards and proximity cards.
The brand includes proprietary solutions based on various levels of the ISO/IEC 14443 Type-A 13.56 MHz contactless smart card standard. It uses AES and DES/Triple-DES encryption standards, as well as an older proprietary encryption algorithm, Crypto-1. According to NXP, 10 billion of their smart card chips and over 150 million reader modules have been sold. [1]
The MIFARE trademark is owned by NXP Semiconductors, which was spun off from Philips Electronics in 2006. [2] [3]
MIFARE products are embedded in contactless and contact smart cards, smart paper tickets, wearables and phones. [4] [5]
The MIFARE brand name (derived from the term MIKRON FARE collection and created by the company Mikron) covers four families of contactless cards:
Subtypes: MIFARE Classic EV1 (other subtypes are no longer in use).
Subtypes: MIFARE Plus S, MIFARE Plus X, MIFARE Plus SE and MIFARE Plus EV2.
Subtypes: MIFARE Ultralight C, MIFARE Ultralight EV1, MIFARE Ultralight Nano and MIFARE Ultralight AES.
Subtypes: MIFARE DESFire EV1, MIFARE DESFire EV2, MIFARE DESFire EV3 and MIFARE DESFire Light.
There is also the MIFARE SAM AV2 contact smart card. This can be used to handle the encryption in communicating with the contactless cards. The SAM (Secure Access Module) provides the secure storage of cryptographic keys and cryptographic functions.
The MIFARE Classic IC is a basic memory storage device, where the memory is divided into segments and blocks with simple security mechanisms for access control. They are ASIC-based and have limited computational power. Due to their reliability and low cost, those cards are widely used for electronic wallets, access control, corporate ID cards, transportation or stadium ticketing. It uses an NXP proprietary security protocol (Crypto-1) for authentication and ciphering.[ citation needed ]
MIFARE Classic encryption has been compromised; see below for details.[ citation needed ]
The MIFARE Classic with 1K memory offers 1,024 bytes of data storage, split into 16 sectors; each sector is protected by two different keys, called A and B. Each key can be programmed to allow operations such as reading, writing, increasing value blocks, etc. MIFARE Classic with 4K memory offers 4,096 bytes split into forty sectors, of which 32 are the same size as in the 1K with eight more that are quadruple size sectors. MIFARE Classic Mini offers 320 bytes split into five sectors. For each of these IC types, 16 bytes per sector are reserved for the keys and access conditions and can not normally be used for user data. Also, the very first 16 bytes contain the serial number of the card and certain other manufacturer data and are read-only. That brings the net storage capacity of these cards down to 752 bytes for MIFARE Classic with 1K memory, 3,440 bytes for MIFARE Classic with 4K memory, and 224 bytes for MIFARE Mini.[ citation needed ]
Parts of this article (those related to smartphone types) need to be updated.(December 2013) |
The Samsung TecTile NFC tag stickers use MIFARE Classic chips. This means only devices with an NXP NFC controller chip can read or write these tags. At the moment BlackBerry phones, the Nokia Lumia 610 (August 2012 [6] ), the Google Nexus 4, Google Nexus 7 LTE and Nexus 10 (October 2013 [7] ) can't read/write TecTile stickers.[ citation needed ]
MIFARE Plus is a replacement IC solution for the MIFARE Classic.
It is less flexible than a MIFARE DESFire EV1 contactless IC.
MIFARE Plus was publicly announced in March 2008 with first samples in Q1 2009. [8]
MIFARE Plus, when used in older transportation systems that do not yet support AES on the reader side, still leaves an open door to attacks. Though it helps to mitigate threats from attacks that broke the Crypto-1 cipher through the weak random number generator, it does not help against brute force attacks and crypto analytic attacks. [9]
During the transition period from MIFARE Classic to MIFARE Plus where only a few readers might support AES in the first place, it offers an optional AES authentication in Security Level 1 (which is in fact MIFARE Classic operation). This does not prevent the attacks mentioned above but enables a secure mutual authentication between the reader and the card to prove that the card belongs to the system and is not fake.
In its highest security level SL3, using 128-bit AES encryption, MIFARE Plus is secured from attacks.[ citation needed ]
MIFARE Plus EV1 was announced in April 2016. [10]
New features compared to MIFARE Plus X include:
The MIFARE Plus EV2 was introduced to the market on 23 June 2020. [11] It comes with an enhanced read performance and transaction speed compared to MIFARE Plus EV1. [12]
New features compared to MIFARE Plus EV1 include:
The MIFARE Ultralight has only 512 bits of memory (i.e. 64 bytes), without cryptographic security. The memory is provided in 16 pages of 4 bytes. Cards based on these chips are so inexpensive that they are often used for disposable tickets for events such as the 2006 FIFA World Cup. It provides only basic security features such as one-time-programmable (OTP) bits and a write-lock feature to prevent re-writing of memory pages but does not include cryptography as applied in other MIFARE product-based cards.
MIFARE Ultralight EV1 [13] introduced in November 2012 the next generation of paper ticketing smart card ICs for limited-use applications for ticketing schemes and additional security options. [14] It comes with several enhancements above the original MIFARE Ultralight:
Introduced at the Cartes industry trade show in 2008, the MIFARE Ultralight C IC is part of NXP's low-cost MIFARE product offering (disposable ticket). With Triple DES, MIFARE Ultralight C uses a widely adopted standard, enabling easy integration in existing infrastructures. The integrated Triple DES authentication provides an effective countermeasure against cloning.[ citation needed ]
Key applications for MIFARE Ultralight C are public transportation, event ticketing, loyalty and NFC Forum tag type 2.
It was introduced in 2022.
The MIFARE DESFire (MF3ICD40) was introduced in 2002 and is based on a core similar to SmartMX, with more hardware and software security features than MIFARE Classic. It comes pre-programmed with the general-purpose MIFARE DESFire operating system which offers a simple directory structure and files. They are sold in four variants: One with Triple-DES only and 4 KiB of storage, and three with AES (2, 4, or 8 kiB; see MIFARE DESFire EV1). The AES variants have additional security features; e.g., CMAC. MIFARE DESFire uses a protocol compliant with ISO/IEC 14443-4. [16] The contactless IC is based on an 8051 processor with 3DES/AES cryptographic accelerator, making very fast transactions possible.
The maximal read/write distance between card and reader is 10 centimetres (3.9 in), but the actual distance depends on the field power generated by the reader and its antenna size.
In 2010, NXP announced the discontinuation of the MIFARE DESFire (MF3ICD40) after it had introduced its successor MIFARE DESFire EV1 (MF3ICD41) in late 2008. In October 2011 researchers of Ruhr University Bochum [17] announced that they had broken the security of MIFARE DESFire (MF3ICD40), which was acknowledged by NXP [18] (see MIFARE DESFire security).
First evolution of MIFARE DESFire contactless IC, broadly backwards compatible. Available with 2 KiB, 4 KiB, and 8 KiB non-volatile memory. Other features include: [19]
MIFARE DESFire EV1 was publicly announced in November 2006.[ citation needed ]
The second evolution of the MIFARE DESFire contactless IC family, broadly backwards compatible. [20] New features include:
MIFARE DESFire EV2 was publicly announced in March 2016 at the IT-TRANS event in Karlsruhe, Germany
The latest evolution of the MIFARE DESFire contactless IC family, broadly backward compatible. New features include:
MIFARE DESFire EV3 was publicly announced on 2 June 2020. [21]
MIFARE SAMs are not contactless smart cards. They are secure access modules designed to provide the secure storage of cryptographic keys and cryptographic functions for terminals to access the MIFARE products securely and to enable secure communication between terminals and host (backend). MIFARE SAMs are available from NXP in the contact-only module (PCM 1.1) as defined in ISO/IEC 7816-2 and the HVQFN32 format.[ citation needed ]
Integrating a MIFARE SAM AV2 in a contactless smart card reader enables a design that integrates high-end cryptography features and the support of cryptographic authentication and data encryption/decryption.[ citation needed ] Like any SAM, it offers functionality to store keys securely and perform authentication and encryption of data between the contactless card and the SAM and the SAM towards the backend. Next to a classical SAM architecture, the MIFARE SAM AV2 supports the X-mode which allows a fast and convenient contactless terminal development by connecting the SAM to the microcontroller and reader IC simultaneously.[ citation needed ]
MIFARE SAM AV2 offers AV1 mode and AV2 mode where in comparison to the SAM AV1 the AV2 version includes public key infrastructure (PKI), hash functions like SHA-1, SHA-224, and SHA-256. It supports MIFARE Plus and secure host communication. Both modes provide the same communication interfaces, cryptographic algorithms (Triple-DES 112-bit and 168-bit key, MIFARE products using Crypto1, AES-128 and AES-192, RSA with up to 2048-bit keys), and X-mode functionalities.[ citation needed ] The MIFARE SAM AV3 is the third generation of NXP's Secure Access Module, and it supports MIFARE ICs as well as NXP's UCODE DNA, ICODE DNA and NTAG DNA ICs. [22]
A cloud-based platform that digitizes MIFARE product-based smart cards and makes them available on NFC-enabled smartphones and wearables. With this, new Smart City use cases such as mobile transit ticketing, mobile access and mobile micropayments are being enabled. [23]
The MIFARE product portfolio was originally developed by Mikron in Gratkorn, Austria. Mikron was acquired by Philips in 1995. [24] Mikron sourced silicon from Atmel in the US, Philips in the Netherlands, and Siemens in Germany.[ citation needed ]
Infineon Technologies (then Siemens) licensed MIFARE Classic from Mikron in 1994 [25] and developed both stand alone and integrated designs with MIFARE product functions. Infineon currently produces various derivatives based on MIFARE Classic including 1K memory (SLE66R35) and various microcontrollers (8 bit (SLE66 series), 16 bit (SLE7x series), and 32 bit (SLE97 series) with MIFARE implementations, including devices for use in USIM with Near Field Communication. [26]
Motorola tried to develop MIFARE product-like chips for the wired-logic version but finally gave up. The project expected one million cards per month for start, but that fell to 100,000 per month just before they gave up the project. [27]
In 1998 Philips licensed MIFARE Classic to Hitachi [28] Hitachi licensed MIFARE products for the development of the contactless smart card solution for NTT's IC telephone card which started in 1999 and finished in 2006.[ citation needed ] In the NTT contactless IC telephone card project, three parties joined: Tokin-Tamura-Siemens, Hitachi (Philips-contract for technical support), and Denso (Motorola-only production).[ citation needed ] NTT asked for two versions of chip, i.e. wired-logic chip (like MIFARE Classic) with small memory and big memory capacity. Hitachi developed only big memory version and cut part of the memory to fit for the small memory version.
The deal with Hitachi was upgraded in 2008 by NXP (by then no longer part of Philips) to include MIFARE Plus and MIFARE DESFire to the renamed semiconductor division of Hitachi Renesas Technology. [29]
In 2010 NXP licensed MIFARE products to Gemalto. In 2011 NXP licensed Oberthur to use MIFARE products on SIM cards. In 2012 NXP signed an agreement with Giesecke & Devrient to integrate MIFARE product-based applications on their secure SIM products. These licensees are developing Near Field Communication products [30] [31]
The encryption used by the MIFARE Classic IC uses a 48-bit key. [32]
A presentation by Henryk Plötz and Karsten Nohl [33] at the Chaos Communication Congress in December 2007 described a partial reverse-engineering of the algorithm used in the MIFARE Classic chip. Abstract and slides [34] are available online. A paper that describes the process of reverse engineering this chip was published at the August 2008 USENIX security conference. [35]
In March 2008 the Digital Security [36] research group of the Radboud University Nijmegen made public that they performed a complete reverse-engineering and were able to clone and manipulate the contents of an OV-Chipkaart which is using MIFARE Classic chip. [37] For demonstration they used the Proxmark3 device, a 125 kHz / 13.56 MHz research instrument. [38] The schematics and software are released under the free GNU General Public License by Jonathan Westhues in 2007. They demonstrate it is even possible to perform card-only attacks using just an ordinary stock-commercial NFC reader in combination with the libnfc library.
The Radboud University published four scientific papers concerning the security of the MIFARE Classic:
In response to these attacks, the Dutch Minister of the Interior and Kingdom Relations stated that they would investigate whether the introduction of the Dutch Rijkspas could be brought forward from Q4 of 2008. [43]
NXP tried to stop the publication of the second article by requesting a preliminary injunction. However, the injunction was denied, with the court noting that, "It should be considered that the publication of scientific studies carries a lot of weight in a democratic society, as does inform society about serious issues in the chip because it allows for mitigating of the risks." [44] [45]
Both independent research results are confirmed by the manufacturer NXP. [46] These attacks on the cards didn't stop the further introduction of the card as the only accepted card for all Dutch public transport the OV-chipkaart continued as nothing happened [47] but in October 2011 the company TLS, responsible for the OV-Chipkaart announced that the new version of the card will be better protected against fraud. [48]
The MIFARE Classic encryption Crypto-1 can be broken in about 200 seconds on a laptop from 2008, [49] if approx. 50 bits of known (or chosen) keystream are available. This attack reveals the key from sniffed transactions under certain (common) circumstances and/or allows an attacker to learn the key by challenging the reader device.
The attack proposed in [50] recovers the secret key in about 40 ms on a laptop. This attack requires just one (partial) authentication attempt with a legitimate reader.
Additionally, there are a number of attacks that work directly on a card and without the help of a valid reader device. [51] These attacks have been acknowledged by NXP. [52] In April 2009 new and better card-only attack on MIFARE Classic has been found. It was first announced at the rump session of Eurocrypt 2009. [53] This attack was presented at SECRYPT 2009. [54] The full description of this latest and fastest attack to date can also be found in the IACR preprint archive. [55] The new attack improves by a factor of more than 10 all previous card-only attacks on MIFARE Classic, has instant running time, and does not require a costly precomputation. The new attack allows recovering the secret key of any sector of the MIFARE Classic card via wireless interaction, within about 300 queries to the card. It can then be combined with the nested authentication attack in the Nijmegen Oakland paper to recover subsequent keys almost instantly. Both attacks combined and with the right hardware equipment such as Proxmark3, one should be able to clone any MIFARE Classic card in 10 seconds or less. This is much faster than previously thought.
In an attempt to counter these card-only attacks, new "hardened" cards have been released in and around 2011, such as the MIFARE Classic EV1. [56] These variants are insusceptible for all card-only attacks publicly known until then, while remaining backward compatible with the original MIFARE Classic. In 2015, a new card-only attack was discovered that is also able to recover the secret keys from such hardened variants. [57] Since the discovery of this attack, NXP is officially recommending to migrate from MIFARE Classic product-based systems to higher security products. [58]
In November 2010, security researchers from the Ruhr University released a paper detailing a side-channel attack against MIFARE product-based cards. [59] The paper demonstrated that MIFARE DESFire product-based cards could be easily emulated at a cost of approximately $25 in "off the shelf" hardware. The authors asserted that this side-channel attack allowed cards to be cloned in approximately 100 ms. Furthermore, the paper's authors included hardware schematics for their original cloning device, and have since made corresponding software, firmware and improved hardware schematics publicly available on GitHub. [60]
In October 2011 David Oswald and Christof Paar of Ruhr-University in Bochum, Germany, detailed how they were able to conduct a successful "side-channel" attack against the card using equipment that can be built for nearly $3,000. Called "Breaking MIFARE DESFire MF3ICD40: Power Analysis and Templates in the Real World", [61] they stated that system integrators should be aware of the new security risks that arise from the presented attacks and can no longer rely on the mathematical security of the used 3DES cipher. Hence, to avoid, e.g. manipulation or cloning of smart cards used in payment or access control solutions, proper actions have to be taken: on the one hand, multi-level countermeasures in the back end allow to minimize the threat even if the underlying RFID platform is insecure," In a statement [62] NXP said that the attack would be difficult to replicate and that they had already planned to discontinue the product at the end of 2011. NXP also stated "Also, the impact of a successful attack depends on the end-to-end system security design of each individual infrastructure and whether diversified keys – recommended by NXP – are being used. If this is the case, a stolen or lost card can be disabled simply by the operator detecting the fraud and blacklisting the card, however, this operation assumes that the operator has those mechanisms implemented. This will make it even harder to replicate the attack with a commercial purpose."
In September 2012 a security consultancy Intrepidus [63] demonstrated at the EU SecWest event in Amsterdam, [64] that MIFARE Ultralight product-based fare cards in the New Jersey and San Francisco transit systems can be manipulated using an Android application, enabling travelers to reset their card balance and travel for free in a talk entitled "NFC For Free Rides and Rooms (on your phone)". [65] Although not a direct attack on the chip but rather the reloading of an unprotected register on the device, it allows hackers to replace value and show that the card is valid for use. This can be overcome by having a copy of the register online so that values can be analyzed and suspect cards hot-listed. NXP has responded by pointing out that they had introduced the MIFARE Ultralight C in 2008 with 3DES protection and in November 2012 introduced the MIFARE Ultralight EV1 [66] with three decrement only counters to foil such reloading attacks.
For systems based on contactless smartcards (e.g. public transportation), security against fraud relies on many components, of which the card is just one. Typically, to minimize costs, systems integrators will choose a relatively cheap card such as a MIFARE Classic and concentrate security efforts in the back office. Additional encryption on the card, transaction counters, and other methods known in cryptography are then employed to make cloned cards useless, or at least to enable the back office to detect a fraudulent card, and put it on a blacklist. Systems that work with online readers only (i.e., readers with a permanent link to the back office) are easier to protect than systems that have offline readers as well, for which real-time checks are not possible and blacklists cannot be updated as frequently.
Another aspect of fraud prevention and compatibility guarantee is to obtain certification called to live in 1998 ensuring the compatibility of several certified MIFARE product-based cards with multiple readers. With this certification, the main focus was placed on the contactless communication of the wireless interface, as well as to ensure proper implementation of all the commands of MIFARE product-based cards. The certification process was developed and carried out by the Austrian laboratory called Arsenal Research. Today, independent test houses such as Arsenal Testhouse, UL and LSI-TEC, perform the certification tests and provide the certified products in an online database. [67]
Card name | Locality | Type | Details |
---|---|---|---|
SUBE card | Argentina (Buenos Aires) | MIFARE Classic 1K | Used for public transport, such as Metro, trains and buses [68] |
Tarjeta Sin Contacto MOVI | Argentina (Rosario) | MIFARE DESFire EV1 SAM V2 [69] | Means of payment for urban transport and as of 2015 payment for public bicycles and parking meters. |
Adelaide Metro metroCard | Australia (Adelaide) | MIFARE DESFire EV1 | Adelaide Metro network (Bus, Train and Tram) [70] |
Baku metrocard | Azerbaijan (Baku) | MIFARE Classic 1K, MIFARE Plus S 1K [71] | For use on the subway rides on the Baku Metro. |
M-Card | Canada (St. John's) | MIFARE Classic 1K | Used on the Metrobus Transit system. [72] |
Compass Card | Canada (Metro Vancouver) | MIFARE DESFire EV1 4K, MIFARE Ultralight (single use) [73] | Used for public transit (TransLink). $6 refundable deposit. [74] |
Tarjeta Metroval [75] | Chile (Valparaíso) | MIFARE Classic 1K | Valparaíso Metro uses this card as a unique payment method |
Tarjeta Bip! | Chile (Santiago de Chile) | MIFARE Classic 1K and 4K (if bank bip or university bip are used) | Metro de Santiago, Transantiago [76] |
In Karta | Czech Republic (nationwide) | MIFARE DESFire, MIFARE DESFire EV1 | , [77] Used for transport on trains, aimed at regular train users. Using the card enables 25% discount on fares. |
Hradecká karta | Czech Republic (Hradec Králové) | MIFARE Classic 4K | Card is issued by DPMHK a.s. (Transport company of Hradec Králové), no longer compatible with Pardubická karta. [78] |
Matkakortti | Finland (Helsinki) | MIFARE DESFire | Can be used with all forms of public transport systems within Helsinki Metropolitan Area. [79] |
Metromoney | Georgia (Tbilisi) | MIFARE Classic 1K | Used in municipal transport (metro, bus) and while traveling by Rike-Narikala ropeway. [80] |
Delhi Metro Rail Corporation | India | MIFARE Ultralight | Used in Metro transit system and for paying fares in DTC and cluster buses. [81] |
Namma Metro Smart Card | India (Bengaluru) | MIFARE DESFire EV1 | Can be used to travel in Namma Metro in Bengaluru [82] |
TFI Leap Card | Ireland (Dublin) | MIFARE DESFire EV1 [83] | replaces the individual Luas, Dart and Dublin Bus smartcards |
AltoAdige/Südtirol Pass | Italy (Trentino-Alto Adige/Südtirol) | MIFARE DESFire EV1 | Southern Tirol network (Bus, Train and Cable-cars) [84] |
Tallinja Card | Malta | MIFARE Plus X 2K | Used by Malta Public Transport (buses); https://www.publictransport.com.mt/en/tallinja-card |
AT HOP card | New Zealand (Auckland) | MIFARE DESFire EV1 | Introduced as the regional integrated ticketing card. The previous branded HOP card aka "Snapper/HOP" uses the JCOP standard and was phased out of use in Auckland in 2013. [85] |
SmartTech Production | Hong Kong | MIFARE Golden Partner [86] | |
TransCard | Slovakia | MIFARE DESFire EV1 | Used by almost every public transport system in Slovakia. In most cases only referred to as BČK – Bezkontaktná čipová karta (contactless smart card). Managed by Zväz autobusovej dopravy (Association of bus transport) as Slovenský dopravný pas (Slovak transport pass). [87] |
Urbana | Slovenia (Ljubljana) | MIFARE DESFire EV1 | Used by buses, parking spaces, libraries, museums, the Ljubljana Castle funicular, sports institutes and cultural events. [88] |
T-mobilitat | Spain (Barcelona) | MIFARE DESFire [89] | Metro, trains and buses, with compatibility with Bicing bike rentals, car parks. |
Resekortet | Sweden | MIFARE Classic 1K [90] | Travel ticket for buses and trains. |
EasyCard | Taiwan | MIFARE Classic, MIFARE Plus [91] | |
Oyster card | United Kingdom (London) | MIFARE DESFire EV1 | Migrated from MIFARE Classic to MIFARE DESFire EV1 in 2011 [92] |
Transit Access Pass | United States (Los Angeles, California) | MIFARE Classic 1K / MIFARE Plus [93] | Used as electronic ticketing for most public transport within Los Angeles County. |
Hop Fastpass | United States (Portland, Oregon) | MIFARE DESFire EV1 256B [94] | |
Breeze Card | United States (Atlanta Metropolitan Area, Georgia) | MIFARE DESFire EV1, MIFARE Ultralight (Breeze Ticket) | Used on transport in the Greater Atlanta area on systems such as MARTA, CobbLinc, Ride Gwinnett, and GRTA Xpress regional busses. [95] |
Clipper Card | United States (San Francisco Bay Area, California) | MIFARE DESFire EV1 4K | Replacing TransLink, which used a Motorola Card. [96] |
Talon Card | United States (Kennesaw State University) | MIFARE Classic 4K | Used for door access and on campus payments |
SmarTrip | United States (Washington Metropolitan Area, Washington, D.C.) | MIFARE Plus X 2K | Used on the Washington Metropolitan Area Transit Authority and neighbouring transit systems; accepted on systems in Baltimore, Maryland |
Metrorrey | México(Monterrey) | MIFARE Classic 1K | Used in public transport like, metro, metrobus, and the new generation of metropolitan bus Muevo Leon |
Beep (smart card) | Philippines (Metro Manila) | MIFARE Classic, MIFARE DESFire EV1 [97] | Used on the LRT Line 1 (Metro Manila), LRT Line 2, MRT Line 3 (Metro Manila), [98] BGC Bus [99] |
Freedom Card | United States (Philadellphia) | MIFARE DESFire EV1 4K | Used for fare collection at PATCO stations |
Application | Application category | Project | NXP partner | Locality | Product used | Usecase |
---|---|---|---|---|---|---|
Automatic fare collection | Smart mobility | Moscow Metro | Smart Technologies Group | Moscow | MIFARE Ultralight | Contactless smartcards for payment in the AFC System of the Moscow Metro [100] |
Parking | Smart mobility | Pay on Foot system | Skidata | Ireland | Used for cashless vending applications for parking [101] | |
Mobile ticketing | Access | MIFARE4Mobile | Gemalto, Giesecke & Devrient, Oberthur Technologies, STMicroelectronics | MIFARE on SmartMX | Access to buildings through smartphone [102] | |
Tourist card | Smart mobility | Mobilis Card | Agencia Valenciana de Mobilidad (aVM) | Valencia | MIFARE on SmartMX | Tourist card, bike rental, electric car rental, transport ticketing, taxi card, access management and payment function [103] |
Tourist card | Smart mobility | Oyster card | London | MIFARE Classic 1K | Used for public transport [100] | |
Fuel card | Smart mobility | Shell | Plastkart | Turkey | MIFARE Classic 1K | Loyalty programs at petrol stations [104] |
Fuel card | Smart mobility | Petrol Ofisi | Plastkart | Turkey | MIFARE Classic 1K | Loyalty programs at petrol stations [105] |
Taxi card | Smart mobility | Touch Travel Card | Dialog Axiata, Silverleap Technology | Sri Lanka | MIFARE DESFire EV1 | Payment solution in taxis [106] |
Taxi card | Smart mobility | NOL | RTA | Dubai | Muliapplication card also used for taxi payment [107] | |
Ferry card | Smart mobility | Opal card | Sydney | MIFARE DESFire EV1 | Card for transport and ferry services [100] | |
Car sharing | Smart mobility | Car2Go | Daimler | MIFARE DESFire EV1 | Used for car sharing [108] | |
Bike rental | Smart mobility | Callock | Bike rental [109] | |||
Corporate access | Access | Nestlé | KABA | MIFARE DESFire EV1 | Access Security Solution [110] | |
Bike rental | Smart mobility | Callock | Bike rental [109] | |||
Home access | Access | AirKey | EVVA | MIFARE on SmartMX | Mobile access [109] | |
Home access | Access | Immobilienfirma Top-Invest sárl | Salto | Luxemburg | MIFARE DESFire EV1 | Smart lock for home access [111] |
Hotel access | Access | Marriott Hotel Card | KABA | Hotel access card [112] | ||
Campus card | Access | Campus Card University of Cambridge | Salto | Cambridge, UK | MIFARE DESFire EV1 | Multiapplication campus card [113] |
Campus Card | Access | Campus Card University of Oxford | Oxford, UK | MIFARE DESFire EV2 8K | Multiapplication campus card [114] | |
Event ticketing | Access | FC Köln | Payment Solutions | Köln, Germany | MIFARE DESFire EV1 | Event ticketing application for soccer games [115] |
Event ticketing | Access | Ticket FIFA 2014 | Brazil | Event ticketing for soccer WM [116] | ||
Museum card | Access | Müze Kart | Mapikart, Türsab | Istanbul, Turkey | MIFARE Classic 1K | Access to museum [117] |
Membership card | Loyalty | Manchester City Football Club – Stadium Membership Card | Gemalto | Manchester | Access, loyalty, membership, payment function [118] | |
Loyalty card | Loyalty | Rabbit Card – Carrot Rewards | Bangkok, Thailand | MIFARE DESFire EV1 | Used for transport, shops, restaurants, identification, access control, security and Carrot Reward [119] [120] | |
Loyalty card | Loyalty | Trans Studio Amusement Park | Bank Mega | Indonesia | MIFARE DESFire EV1 | Trans Studio Amusement Park [121] |
NFC tags | NFC | NFC tag | SMARTRAC | NFC enabled smartphones [122] | ||
Health card | Identification | Sesam-Vitale card | France | MIFARE on SmartMX | Health and identification card [123] | |
Digital signature | Identification | Vingcard | Assa Abloy | Digital signature used for access [124] | ||
Micropayment | Micropayment | Yeldi | Identiv | India | MIFARE DESFire EV1 | Cashless payments via mobile phones [125] |
Multiapplication card | Multiapplication | Touch travel card | Dialog Axiata, Silverleap Technology | Sri Lanka | MIFARE DESFire EV1; MIFARE SAM AV2 | Transport, micropayments, payment for shops or taxis, NFC mobile ticketing [106] |
Multiapplication card | Multiapplication | Passolig (TFF) | E-Kart, E-Kent, Aktifbank | Turkey | MIFARE DESFire EV1; JCOP | Stadium access – ticketing, micropayments, payments, transport [126] |
Smart paper ticket | Moscow Metropolitan Card | Smart Technologies Group | Moscow, Russia | MIFARE Ultralight | Used for electronic smart paper ticketing in public transport [127] |
A smart card (SC), chip card, or integrated circuit card, is a card used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) chip. Many smart cards include a pattern of metal contacts to electrically connect to the internal chip. Others are contactless, and some are both. Smart cards can provide personal identification, authentication, data storage, and application processing. Applications include identification, financial, public transit, computer security, schools, and healthcare. Smart cards may provide strong security authentication for single sign-on (SSO) within organizations. Numerous nations have deployed smart cards throughout their populations.
ISO/IEC 14443Identification cards – Contactless integrated circuit cards – Proximity cards is an international standard that defines proximity cards used for identification, and the transmission protocols for communicating with it.
Near-field communication (NFC) is a set of communication protocols that enables communication between two electronic devices over a distance of 4 cm or less. NFC offers a low-speed connection through a simple setup that can be used for the bootstrapping of capable wireless connections. Like other proximity card technologies, NFC is based on inductive coupling between two electromagnetic coils present on a NFC-enabled device such as a smartphone. NFC communicating in one or both directions uses a frequency of 13.56 MHz in the globally available unlicensed radio frequency ISM band, compliant with the ISO/IEC 18000-3 air interface standard at data rates ranging from 106 to 848 kbit/s.
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. Examples of security tokens include wireless key cards used to open locked doors, a banking token used as a digital authenticator for signing in to online banking, or signing transactions such as wire transfers.
FeliCa is a contactless RFID smart card system from Sony in Japan, primarily used in electronic money cards. The name stands for Felicity Card. First utilized in the Octopus card system in Hong Kong, the technology is used in a variety of cards also in countries such as Singapore, Japan, Indonesia, Macau, the Philippines and the United States.
Java Card OpenPlatform (JCOP) is a smart card operating system for the Java Card platform developed by IBM Zürich Research Laboratory. On 31 January 2006 the development and support responsibilities transferred to the IBM Smart Card Technology team in Böblingen, Germany. Since July 2007 support and development activities for the JCOP operating system on NXP / Philips silicon are serviced by NXP Semiconductors.
HID Global Corporation is an American manufacturer of secure identity products. The company is an subsidiary of Assa Abloy, a multinational door and access control conglomerate. Björn Lidefelt was appointed CEO on 27 January 2020. He succeeded Stefan Widing, who led HID Global for over four years.
A contactless smart card is a contactless credential whose dimensions are credit card size. Its embedded integrated circuits can store data and communicate with a terminal via NFC. Commonplace uses include transit tickets, bank cards and passports.
Rejsekort is an electronic ticket system for public transport in Denmark. The system is a collaborative work between DSB, HUR, Ørestadsselskabet, and various regional bus companies, and work on it started on August 18, 2003. In June 2005, Thales Group and Accenture were chosen as suppliers.
The Breeze Card is an American stored value smart card that passengers use as part of an automated fare collection system which the Metropolitan Atlanta Rapid Transit Authority (MARTA) introduced to the general public in early October 2006. The card automatically debits the cost of the passenger’s ride when placed on or near the Breeze Target at the fare gate. Transit riders are able to add value or time-based passes to the card at Breeze Vending Machines (BVM) located at all MARTA stations. The major phases of MARTA's Breeze transformation took place before July 1, 2007 when customers were still able to purchase TransCards from ridestores or their employers. They were also able to obtain paper transfers from bus drivers to access the train. As of July 1, 2007 the TransCard and the paper transfers were discontinued and patrons now use a Breeze Card or ticket to access the system, and all transfers are loaded on the card. Breeze Vending Machines (BVM) distribute regional transit provider passes The Breeze Card employs passive RFID technology currently in use in many transit systems around the world.
Contactless payment systems are credit cards and debit cards, key fobs, smart cards, or other devices, including smartphones and other mobile devices, that use radio-frequency identification (RFID) or near-field communication (NFC) for making secure payments. The embedded integrated circuit chip and antenna enable consumers to wave their card, fob, or handheld device over a reader at the point-of-sale terminal. Contactless payments are made in close physical proximity, unlike other types of mobile payments which use broad-area cellular or Wi-Fi networks and do not involve close physical proximity.
Calypso is an international electronic ticketing standard for microprocessor contactless smart cards, originally designed by a group of transit operators from 11 countries including Belgium, Canada, France, Germany, Italy, Latvia, México, Portugal and others. It ensures multi-sources of compatible products, and allows for interoperability between several transport operators in the same area.
Crypto1 is a proprietary encryption algorithm and authentication protocol created by NXP Semiconductors for its MIFARE Classic RFID contactless smart cards launched in 1994. Such cards have been used in many notable systems, including Oyster card, CharlieCard and OV-chipkaart.
Massachusetts Bay Transportation Authority v. Anderson, et al., Civil Action No. 08-11364, was a challenge brought by the Massachusetts Bay Transportation Authority (MBTA) to prevent three Massachusetts Institute of Technology (MIT) students from publicly presenting a security vulnerability they discovered in the MBTA's CharlieCard automated fare collection system. The case concerns the extent to which the disclosure of a computer security flaw is a form of free speech protected by the First Amendment to the United States Constitution.
MIFARE4Mobile is a technical specification published by NXP Semiconductors in December 2008 to manage MIFARE-based applications in mobile devices. The specification provides mobile network operators and service providers with a single, interoperable programming interface, easing the use of the contactless MIFARE technology in future mobile Near Field Communication (NFC) devices.
Urbana is a travel card used on public transport services in Ljubljana, the capital of Slovenia. It is a credit-card sized plastic card on which the customer electronically loads money and/or passes. It was introduced to enhance the technology of the public transportation system and eliminate the burden of carrying and collecting tokens or cash.
The TFI Leap Card is a contactless smart card for automated fare collection overseen by Transport for Ireland (TFI). It was introduced in the Greater Dublin area in 2011 for Luas, DART, Iarnród Éireann and Dublin Bus, but acceptance has significantly expanded, and it is now accepted in cities nationwide and on some longer distance commuter routes. Initially, Leap Cards offered only a pre-paid electronic wallet system for single-trip fares; since May 2014, it has also been possible to load it with weekly, monthly and annual subscriptions. In September 2017, there were over 2.5 million Leap Card users according to the National Transport Authority. The Leap Card is the result of many years' work by the Railway Procurement Agency and the National Transport Authority as part of the rollout of an integrated ticketing scheme for public transport in Dublin city. Fares are generally discounted compared to cash prices, and integrated ticketing is offered in the Dublin area via a flat fare system across all modes of transport. The minimum top-up for the card is currently €5, and it can be topped up via iPhone/Android App, at LUAS or DART ticketing machines, and in convenience stores offering Payzone services.
Hop Fastpass is a contactless smart card for public transit fare payment on most transit modes in the Portland, Oregon, metropolitan area including MAX Light Rail, WES commuter rail, Portland Streetcar, The Vine, and all TriMet and C-TRAN buses. An initial release to the general public began on July 5, 2017, with the official launch on July 17. The program is managed by TriMet.
Proxmark3 is a multi-purpose hardware tool for radio-frequency identification (RFID) security analysis, research and development. It supports both high frequency and low frequency proximity cards and allows users to read, emulate, fuzz, and brute force the majority of RFID protocols.
On Track Innovations Ltd. (OTI), founded in 1990, is a global company that focuses on creating contactless payment solutions. OTI does this through the use of NFC technologies.