|
|
|
Smart Event Home > Smart Mobility Home > Smart Mobility Program (last update: September 15, 2009) |
Smart Mobility at a glance
Morning |
|
|
Afternoon |
End of the conference
|
|
Ecosystem & Devices
|
|
Applications & Use Cases |
SEPT. 23 MORNING |
Badges delivery - Registration - Welcome Coffee
|
Smart Event 2009 Grand Opening Session - Plenary Session
Part 1: TRUST IN DIGITAL LIFE
Chaired by Jacques Bus, Head of Unit Trust & Security in ICT Research at the European Commission
Our ever more connected world faces raising concerns about cybercrime, identity theft, bank cards frauds and other data breaches. To ensure durable growth of consumer and citizen centric digital services, each part of the digital offer must gain trust from users. This challenge stimulates innovation from Smart Security stakeholders along with other industries - device manufacturers, application and service providers, operators, etc. - and governments.
The trust factor will be discussed in its multiple dimensions:
- European Trust Approach and the public-private partnership initiated by Gemalto, Philips, Nokia and Microsoft
- Standardisation and interoperability issues to achieve trust in digital services
- "Digital identity" challenges in ID management and ID provisioning onlineIndustrial perspective: cooperation and innovation to harmonize R&D and marketing efforts
Outstanding keynote speakers include:
- Kim Cameron, Chief Architect of Identity and Access, Microsoft
- Prof. Reinhard Posch, CIO for the Federal Government of Austria
- Jacques Seneca, Executive Vice President Security Business Unit, Gemalto
- Walter Weigel, Director General, ETSI …
|
|
Part 2: Grand Opening Panel Debate:
NFC and Mobile Payment: Challenges and Opportunities Moderated by Marc Bertin, Chairman, Eurosmart
|
|
Who is going to brave the Crunch to lead NFC Mobile Payment deployment? The one who will solve some sizeable problems that hinder the development of the currently fragile, embryonic NFC ecosystem. One of them relates to the flagship application of mobile banking/payment. But nobody has not yet managed to find the proper deployment and logistical models that will fulfil all the requirements, in terms of security and marketing for the banks, as well as those of their inevitable partners, the MNOs. This is rendered all the more frenetic by incessant reminder that end-user expectations are incredibly high.
The challenges are well-known and the opportunities are still great!
The panel will include:
- Bent Bentsen, Vice Chair, Mobey Forum
- Nader Henein, Security Advisor, EMEA, Research In Motion
- Dr. Andreas Schauer, Product Line Manager Mobile Payment, Division Payment, Giesecke & Devrient
- Jean-Philippe Betoin, NFC Forum |
|
Lunch - Networking - Exhibition
|
|
|
Building trusted mobiles platforms
& applications
A large part of the success of mobile applications relies on trust in every part of the development cycle. Review and analyse the latest approaches, methods and industry initiatives to build secure and trustworthy applications on mobile devices. On top of the agenda this year, open mobile platforms and Mobile Ap Stores challenge the smart security industry.
|
Adapting secure web applications to mobile with open source platforms ...
• The problems and challenges of secure mobile web application development
• How to adapt secure online content to mobile devices with open source project Siruna
• How to test mobile web applications on multiple devices.
• How the mobile internet community can benefit from open source projects
Prof.Dr.ir. Frank Gielen (speaker), CEO; Zhong Yuan Xu, Ir (co-Author), R&D Engineer - Siruna
|
|
Java Card™ 3.0, Webservices and integration with Open Mobile Platforms ...
• The Java Card Platform as a webservice consumer and producer
• Integrating the card with the User Interface of a mobile phone via web technology
• Provide secure services to phone based application
Sebastian Hans, Senior Staff Engineer - Sun Microsystems
|
|
BONDI initiative ...
• Introduction to BONDI
• Widgets and Security
• Future APIs
David Rogers, Director of External Relations - OMTP
|
|
Coffee & Refreshments Break - Networking - Exhibition
Applications Delivery Process
|
|
How to Stop Defects in Mobile Applications Throughout the Development Lifecycle ...
• How multi-core technology is changing development of embedded software, particularly in the mobile phone market
• The problems faced by developers working with multi-core processors in embedded software
• How static analysis can help resolve these problems to create the best software possible for consumer use
Tom Schultz, Director of Products - COVERITY (USA)
|
|
At the heart of Mobile Parametric Development and Automatic Porting with Celsius and Alembic ...
• Technical / In-depth presentation of Mobile Parametric Development & Automatic Porting technology
• methods for developing innovative Mobile Applications across hundreds of phones
Vincent Berge, CEO and Founder - Mobile Distillery
|
|
|
|
Keynote
NFC Container Houssem Assadi, Head of the "security and trusted transactions" lab- Orange
|
|
|
NFC Handsets Applications
Moderator: Wolfgang Effing, Group Vice President, Deputy CTO - Giesecke & Devrient
This session will provide the key results to-date and the overall progress of the contactless applications rollouts around the world. Several promising NFC applications will be detailed, covering innovative roles for the mobile handset: access control, electronic vouchers, loyalty programs... A closing discussion will outline future trends of NFC applications.
|
|
|
Keynote
M-Payment and NFC Projects ...
• Latest advances of the GSMA Pay-by -Mobile initiative
• NFC pilots by Telecom Italia
Sergio Cozzolino - Vice President, Innovative Service Development, Telecom Italia
|
|
An access control solution based on NFC compliant cell phones ...
• Personal identification data stored in a SIM Card used to open NFC locks and remotely managed using SMS and OTA technology
• Access keys managed by a remote server (digital key manager)
Hassen Aziza (speaker), Associate Professor; Philippe Pannier (co-author), Professor - IM2NP, Institut Materiaux Microelectronique Nanosciences de Provence, UMR 6242 CNRS, Aix-Marseille University
|
|
Advancing Near Field Communication (to be confirmed) ...
• Core specifications
• Compliance program to enable certified device
• Use cases for NFC and examples of programs around the world
NFC FORUM
|
|
Coffee & Refreshments Break - Networking - Exhibition
Electronic Vouchers for NFC phones ...
• The NFC-Voucher demonstrator project, architecture and implementation
• Security concerns when using an online voucher system based on NFC
• Technical, legal, business-wise, user adoption views
Karel Wouters (speaker), researcher - Gauthier Van Damme, Researcher - Bart Preneel, Research leader, ESAT/COSIC Katholieke Universiteit Leuven - Jan De Meester, VP card and eCommerce business unit, Clear2Pay
|
|
Touch it! An NFC Urban Marketing Game ...
• NFC and marketing: a valuable scenario in the short-term period
• Proximity marketing: push and pull approaches
• Touch it!: Concept, Technical Solutions and User Experience
• Usability studies
• Conclusion and further work
U. Biader Ceipidor, Professor, Director - A. Ingrosso, researcher - C. M. Medaglia, Professor - A. Moroni (speaker), researcher - S. Sposato, researcher - CATTID University Di Roma Sapienza
|
|
NFC SIM based Loyalty program ...
• Connecting mobile handset NFC compatible with external devices such as POS or Transport Ticketing Machine.
• Loyalty application remote management, impact on the retail network and on the existing POS.
• Comparison with the old Loyalty program based on magnetic stripe cards
Davide Pratone, IC Cards Lab Manager - Telecom Italia LAB, Research & Trends
|
|
Closing discussion:
Which NFC application will emerge as the killer app.? |
|
|
Mobile NFC Ecosystem
Moderator: Gil Bernabeu, Technical Director, GlobalPlatform
This session deals with the challenges faced by the multiple actors of NFC ecosystem. The prominent role of Trusted Services Manager for successful applications and end to end security, will be explored thoroughly, along with other key requirements to refine the NFC business case. A closing discussion will allow further knowledge-sharing on theses issues.
|
Trusted Services Management:
|
Key Requirements for Trusted Service Management in Commercially Successful Roll-out of NFC ...
• The ecosystem perspective: TSM services as neutral enabler for different stakeholders
• The business model perspective: how to ensure the security and reliability while retaining the market specific needs
• The technology perspective: why Trusted Service Manager should be offering services
Sirpa Nordlund, Sales Director - Venyon
|
|
A buyer's guide to purchasing TSM services for mobile NFC applications
Victoria Richardson, Head of Marketing - PROXAMA (UK)
|
|
Essentials to enable the Carriers to strike gold with mobile money services ...
• Vertical and horizontal Trusted Service Manager roles
• Have the stake holders agreed upon the business model?
• What standards have been deployed to enable the business model?
• What makes the carriers believe in
Jari Nyholm, Director Product Management - SmartTrust
|
|
Coffee & Refreshments Break - Networking - Exhibition
Business cases for the NFC ecosystem:
|
NFC + RFID: How to exploit big opportunities ...
•Trends from closed systems to open ecosystems
• Various use cases: mobile machines, metering
• Criterias for successful NFCprojects
Frank Steigberger, Director of Sales - Arygon
|
|
Building a differentiated business case for Mobile NFC ...
• Positive differentiation of NFC mobile services
• Creating a security gateway to a mobile phone payment function
• Making skimming virtually impossible
• Fully utilizing the SIM card functionality and security
Jonas Andersson, VP Business Development - Precisebiometrics
|
|
Closing discussion:
Are the NFC ecosystems players ready to cooperate?
|
|
|
Improving Customers Experience
User experience is another key enabler for successful mobile applications and services. Discover here how to ensure user-friendly mobile applications.
|
Field Trials of Simple Mobile Services ...
• How to improve the creation and use of mobile services and to foster trust in their security
• Requirements for a new class of Simple Mobile Service
• Smart Card Web Server based integration of the UICC
Carsten Rust (speaker), R&D Project Manager - Sagem Orga; Alessandro Rabbini (co-author), R& D Engineer - Telecom Italia Labs; Stefano Salsano (co-author), Assistant Professor - Radiolabs University of Rome "Tor Vergata"; Lars Schnake (co-author), R&D Engineer - Sagem Orga
|
|
Improving QoE on mobile Internet by applying a P2P network for QoE aggregation ...
• User Centered mobile internet by obeying Quality of Experience (QoE) parameters
• QoE aggregation via P2P infrastructure
• Applying trust measures to peer-to-peer data
Mathias Rieder (speaker); Jens Schumacher, Research Professor; Christian Hämmerle, Research Assistant - University of Applied Sciences Vorarlberg, Research Centre for Process and Product Engineering
|
|
Improving customer experience in cross-platforms environments
Robert Virkus, CEO - Enough Software (Germany)
|
|
Coffee & Refreshments Break - Networking - Exhibition
Innovative Handset-Based Applications
|
This session gives a prospective view on future technologies and emerging trends in handset-based mobile applications. |
|
Detecting Counterfeit Products with the Mobile Phone ...
• How the mobile phone can become a universal tool to check the genuineness of product
• Example of solution already deployed
• a new way to interact with the brand
Dr Justin Picard (speaker), Chief Scientist - Zbigniew Sagan (co-author), Chief Technology Officer, Advanced Track & Trace
|
|
Short-lived certificates as mobile authentication method ...
• Introduction to short-lived X.509 certificates for mobile devices
• Bootstrapping mobile user's identity from Shibboleth
• Demonstration of different use case scenario
Pranav Sharma (speaker), Researcher - Helsinki Institute of Physics Technology Program (HIP-TEK) at CERN - Henri Mikkonen (co-author), Researcher - Helsinki Institute of Physics Technology Programme (HIP-TEK)
|
|
|
Emerging Trusted Mobile Technologies
|
At the interface of Digital Security and Smart Mobility, this session reviews Smart Security Devices used in mobile environments. |
|
The Eurosmart Security Label Programme - How to choose the right level of security?
Rodrigue Gil - Eurosmart (Belgium)
|
|
The Mobile Phone as The ultimate Personal Security Token ...
• use of phone generated one time password
• use of phone as a secure reader so as to deliver digital signature in the course of an ongoing transaction
Marc Vieuille, Chief Technology Officer - KerPass (Romania)
|
|
The MaXSSIMM program : "How to boost Mobile services deployment by Technology push ? ...
• MaXSSIMM program concepts and timeline
• Current issues of service deployment and handset customization
• Benefits for the mobile ecosystem
• Innovative use cases and demonstrators
Laurent Manteau, Coordinator of the MaXSSIM program - Gemalto
|
|
Coffee & Refreshments Break - Networking - Exhibition
|
|
Keynote
Dynamic Security in Mobile Applications ...
• Being able to predict threats that will follow technological advances is quite difficult, if it were easy, software vulnerabilities would have been trivial.
• Advances in trusted technologies that protect our ever expanding mobile existence are developed virtually in parallel with the latter; they are expected to be dynamic in their application so as to grow with the demands on the products they protect.
• we will dive into some of these new technologies that promise to make our lives that much more secure, their practical applications and ultimately we will take a few steps out of the box to see what these solutions may offer down the line.
Nader Henein, Security Advisor, EMEA - Research In Motion
|
|
3GPP Security Standardization: LTE and Home Node B Security Aspects
Dionisio Zumerle, Secretary of the Security Working Group of 3GPP - ETSI (France)
|
|
Ensure reliable, secure, universal NFC
Steve Gussenhoven, Sales Manager - Raisonance (France) |
|
|
|
Mobile Banking & Payment
|
Moderator: Sergio Cozzolino - Vice President. Innovative Service Development, Telecom Italia
The highest level of trust required by mobile payment and cash transactions challenges the Digital Security approach. In addition to contactless payment issues, various m-payment methods are assessed here, from handset top-up to future enhancements of the m-payment services provided by the banks or MNO. |
|
m-Payments and Fraud - Have We Done Enough? ...
• The changing fraud figures over the last ten years.
• How we can use past knowledge to protect against future financial crimes from implementing
• The vulnerabilities within the mobile payments environment
David Dix, Electronic Payments Expert - Cryptomathic
|
|
Coffee & Refreshments Break - Networking - Exhibition
Mobile phone-based cash-services with Match-on-Card biometric security ...
• New range of banking services associated with mobile phone and subscription
• Biometric cardholder verification using the mobile phone in emerging markets
• References to existing and related applications using Match-on-Card
Jonas Andersson (speaker), VP Business Development; Karin Sveheim (co-author), Director of Markets - Precise Biometrics
|
|
Security questions and answers beyond the "Secure Element" ...
• What is Mobile Payment all about?
• Additional security aspects above the Secure Element and the respective solution
• Proposal regarding certifications in using the SIM card as a Secure Element
Andreas Schauer, Product line manager Mobile Payment - Giesecke & Devrient
|
|
Security challenges in mobile payment and e-ticketing solutions ...
• security advantages of UICC based mobile payment compared to handset based.
• realistic security issues related to UICC, handset and management regarding mobile payment
• obtaining high assurance about the security level required for future mobile payment and e-ticketing solutions.
Gerrit van der Bij (speaker), Security Analyst - Marc Witteman (co-author), CTO - Pascal van Gimst, Director Sales & Business Development (co-author) - Riscure
|
|
Closing discussion:
How to stimulate trusted m-payment services roll out? |
|
|
Smart Mobility Security Implementation |
Designing and developing mobile services that combine Security and Convenience leads to rethink the approach of Digital Security. Security experts from Telecoms, Smart Cards and Web universes gather to discuss how to achieve this Smart Mobility. |
|
Trusted User Interface ...
• Why a Trusted User Interface?
• What are the new services that can be enabled with it?
• Trusted User Interface: the necessary companion for mobile payment.
• How can it be efficiently implemented?
Nicolas Ponsini, Project Manager - Trusted Logic
|
|
Scalable Security ...
• Security from the (U)SIM up to the Application Processor
• How GlobalPlatform enables on-mobile security-sensitive services?
• What security options do I have to deploy critical services in the mobile ecosystem?
Christophe Colas, Device Committee Chairman - Globalplatform
|
|
Security validation of mobile MIDP applications using static analysis ...
• Midp – the Java Sun platform for mobile phones. Characteristics.
• How does Midp guarantee security for the applicative layer today?
• Drawbacks of the Midp security infrastructure
• How can static program analysis improve the security certification for mobile applications?
Mariela Pavlova, R&D engineer - Trusted Labs
|
|
Coffee & Refreshments Break - Networking - Exhibition
|
|
Keynote
How The Mobile Device Has Transformed Online User Authentication ...
• Best practices for providing users with a security credential on their mobile device
• How the mobile network operators, security vendors, and customers must collaborate to successfully reach a balance between security and usability for online account access
• View of a mobile network operator on this ecosystem
Phil d'Angio, Business Development for EMEA - Verisign
|
|
NFC in a Trusted Execution Environment ...
• How to Secure Near Field Communication on the device Host?
• How the Secure Element can be integrated and managed in an NFC ecosystem?
• Presentation of the NFC architecture in a Trusted Execution Environment.
Rémy Fugier, Professionnal Services Manager, NFC & Payment - Trusted Logic
|
|
Thwart Hackers with High Assurance Mobile Platforms ...
• System virtualization from mainframes to mobile devices
• Discussion of hypervisor security
• Lessons learned from the world’s first high assurance Common Criteria security certification.
• Relation of secure virtualization to security applications, such as DRM and mobile payments.
Rolland Dudemaine, Senior Software Engineer - Green Hills Software
|
|
|
|
Smart Mobility Applications Trends
|
This session gives a prospective view on the future technologies and the emerging trends in Smart Mobility. Mobile applications analysed range from road safety to localisation based applications. |
|
Towards a smarter road: Three Use Case ...
• New automotive product allowing motorists to interact on trust with every road elements (tools, car park barriers, road signs...)
• also the “Secure Element” for car authentication
• a first step to a new market for the security industry.
Jean Loup Depinay, Program Manager R&D Fundings, Automatics - Oberthur
|
|
SIM-Mee, Mobilizing your social network ...
• Social networking application using USIM, SCWS, and NFC
• Secure exchange of virtual business cards, including signatures
• Security and privacy ensured by asymmetric cryptography
Pr. Serge Chaumette (speaker), Leader of the Distributed Systems and Objects team - Damien Dubernet (co-author), Research engineer - Jérémie Albert (co-author), PhD student - Jonathan Ouoba (co-author), Research engineer - LaBRI (Laboratoire Bordelais de Recherche en Informatique), University of Bordeaux
|
|
MWA GUIDE: a WiFi Location System for visually impaired people ...
• Introduction: mobile devices for the integration of impaired employees
• MWA: the platform
• MWA GUIDE: Features design, Technical solutions and User interface design
• Usability studies
U. Biader Ceipidor, Professor, Director - A. Ingrosso (speaker), researcher - E. Marchi, researcher - C. M. Medaglia, Professor - A. Moroni, researcher - E. Sciarretta, researcher - CATTID University Di Roma Sapienza
|
|
Coffee & Refreshments Break - Networking - Exhibition
|
|
|
End of Smart Mobility 2009 - no lunch
Next year edition: book your calendar for September 2010
Further adjustments can occur. The organizers reserve the right to change the agenda of the conference and the identity of the speaking persons.
|
|
|
|
|