Encrypting the Hyperlinks from NFC Chips - nfc

First, forgive my complete ignorance. I've tried to research this, but I clearly don't know the correct terminology for what I'm trying to accomplish.
I'm trying to set up NFC chips that link to separate, unique profiles. The profiles will be to a web app, but I want to hide the hyperlink to prevent someone from being able to copy the direct link to the profile and put it into another NFC Chip.
Example: A Plastic Business Card with an NFC chip that takes someone to a unique web app profile on their phone. I want to make sure someone can't create a new card and copy/paste the profile link into the new card on their own.
Note: The NFC Chip at this current moment will NOT be used for contactless payments.
Thanks.

So first point, security on NFC is hard, you can make it more difficult but not impossible to get the data from the card depending on how tightly you can control access to readers etc.
But from the sounds of it you are looking just to prevent casual copying.
It also sounds that you want the reading device to be a reading device.
So there are various techniques you can use to prevent casual copying, below I'll list a few in some order of complication (some can be used in combination with others):-
There is a common theme and drawbacks to some of these techniques.
You have to write your own phone App and get it to display the web App in it's own webview as you do not want the URL shown in a standard web browsers address bar.
Any protections you put in the phone App can be extracted from it by reverse engineering the phone App.
Use a NFC Tag like the Ntag21x range that has read password protection. You would write a phone App that knows the password to read the URL and then the App displays it
Encrypt the data on the card using standard encryption method and write an phone App that knows how to decrypt it and has the encryption keys to read the URL
Don't use a standard data format like Ndef but use your own data format again you phone app needs to know how you formatted the data to display
You can make reverse engineering of item 1 and 2 harder by not storing the "secrets" in the App itself but have it get it across the network at run time, but getting the secret can be reverse engineered or sniffed from the network.

Related

What is happening after nfc loyalty card is submitted?

We are developing mobile app in which customers can access multiple loyalty programs. The most convenient way for customers is to use nfc loyalty card and we are in search of ways to implement it via google pay passes and apple wallet passes
However, we are quite not familiar with the pipeline and user—>PoS—>etc interactions.
Could someone explain, please:
What process is happening after card is submitted to PoS terminal? (Interactions with GPay/Wallet and our backend).
Any information is appreciated!
For the Google Pay Passes side the protocol to transmit loyalty card payload through NFC is called Smart Tap. The design is as follows:
The phone with Google Pay and loyalty passes (enabled with Smart tap) loaded into the wallet is tapped on the terminal.
The terminal through Smart Tap Protocol presents a unique collector ID and signed information to the Google Pay app.
The Google Pay app uses this signed information to verify the identity of the terminal and that collector id is used to determine which passes it transmits.
Google Pay transmits the pass payload through Smart Tap from the wallet.
The terminal then decrypts the payload and passes upstream, to the POS.
The best way to think about NFC transmission is as an encrypted alternative to transmitting a value using barcode.

Generate a unique query string value in a URL when NFC chip is scanned?

I'm very new to NFC here. I am working on a project as part of which we are looking to do "check-ins" at a clients locations. We postulate we can use NFC tags so that people can scan them with their phones and easily "check in." The process after scanning would be to send the user to a URL such as example.com/check-in?location=PA&uniqueSerial=1234567.
Is there a way to get a unique serial number to place into the URL on each scan?
What I want to do is verify that the user has actually scanned the tag. What I don't want to happen is have users save the URL from the NFC tag and reload it again to create another "check-in."
Thanks for your help!
This seems to be an identical requirement to Prevent URL obtained from NFC from being shared or accessed remotely
And the answer is No,Yes and to some extent.
It depends on if you want to use a custom written App to read the cards or want to rely on the devices inbuilt behaviours to load the URL.
Most standard NFC tags just read and write to some EPROM data chips, so the data is static on the card, while most cards have a unique serial number this is still static data.
The possibilities are:-
1) Store a static URL in an NDEF message on the card that causes the device to load it in it's own browser - the URL is static and visible to the user for store and re-use. (That's the No response)
2) Write an App to read the cards, the URL can then be hidden from the user but still it will be unique to the card and static, but a determined person with the knowledge could work out the URL. (That's to some extent answer)
With Android you could use and AAR NDEF record to prompt the user to download the App if they don't have it already, not sure it this can be done on other devices.
2a) as 2) but then use the time or other methods to crypto hash the unique ID in time as well to make it a one time code. Harder for people to reverse engineer to but depending on how you do it determines the difficulty. (That's to some extent answer)
3) Their are some advanced cards out their that can run custom programs (one is called JavaCards https://en.wikipedia.org/wiki/Java_Card ), so you could write a program that generates a unique serial you want and then present it to the card reader device as a standard NDEF message that would launch the devices browser to this dynamic URL. (This is a Yes response but it very very advanced)
4) Instead of a NFC card being read from, you could have a smartphone with an App running Host Card Emulation software (or other device with a USB reader/writer might also be able to do Host Card Emulation). This is like option 3 in that the program that generates a unique serial you want and then present it to the card reader device as a standard NDEF message that would launch the devices browser to this dynamic URL.
This of course requires the device to be secured and powered. (This is a Yes response, but has drawback that it is not as cheap as a NFC card and needs it's own power supply and is advanced in terms of programming).
There are some fairly 'off the shelf' NFC chips that can do this. These 'authentication' NFC Tags are typically used for product authentication / counterfeit protection, etc. Example of use case on Seritag's website
However, I can't see that you'd actually need the backend auth to do what you want. Each time the tag is scanned it will generate a new unique auth code and as long as you log any previous codes then the user will always need the next one. Without the backend auth system it wouldn't stop the user just making up a new code but it depends how secure you want it to be.

Is it possible to achieve my goal by using Beacons

I have a mobile IOS application which is basically group chat oriented. I was wondering if I can make it beacon-enabled app. With other words, application which can detect beacons, determine id, receive short ads etc. I am quite new to beacons, still reading a lot about it. I found this article which makes me believe that maybe it is possible to achieve my goal.
I want my app, except for its original functionality, to be able to:
Detect a beacon (even if app is in background, without the need to have been paired or whatever)
Receive simple ads by the beacon (while using the app in a certain mode, to be able to project the ads on phone's screen)
Read some real-time info(if required by the user) like: speed(if moving beacon), temperature etc.
In order to achieve all that I would like not to disturb the end user by making him download additional stuff related to the beacon. I want him to have my app and that's all.
You can monitor for beacons while your app is in the background. You can do this by using the CoreLocation Framework or by using a framework of your beacon supplier. (e.g. Estimote)
To the ads: The beacon will only deliver its pre configured ids. (UUID + Major + Minor). If you want to receive ads, you must have a Webservice that will get your beacon ids and return you the ad to display.
(If the ads never change, you can put them directly into your app without a webservice)
How you will show the ads in your app is completely open to you.
I don't really understand what you mean with real-time-info. There are beacons that also send you TLM. So you can get the temperature and the battery level of the beacon. I've never seen moving beacons or beacons that can transmit their speed.
Some useful links:
https://developer.apple.com/ibeacon/
https://xamoom.com/en/2016/07/ibeacon-for-developers/

(Eddystone) Is it possible to get the number of times an URL is received by a device without writing your own app?

Is it possible to get the amount of times an URL is received by a device from the proximity beacon API? I want to know what the click through ratio is of the broadcasted URL.
That depends. If you write your own app that scans for Eddystone-URL beacons and triggers some content (e.g., the web page itself) off of that, then naturally you're in full control and can implement this kind of analytics. Though it'll only apply to people which installed the app.
If you rely on Chrome for iOS, or the Physical Web iOS and Android apps to discover the Eddystone-URL beacons, then these apps do not provide any such numbers.
However, both Chrome for iOS and the Physical Web apps do fetch some metadata about the URL they detect, such as the page title and page description, without the user first clicking on the link. So there's a slim possibility that you could filter such requests out (they will be made by the Physical Web Service, or some similar "bot"), separate them from the actual visits, and do analytics based on that. Most likely however, this "bot," or the proxying service (which is there precisely to prevent this kind of tracking, and protect the user's privacy), will also do some caching, so you'll see fewer requests than the actual number of times the URL is received by the device.
And finally, dropping to a lower level, a note: most beacons are uni-directional, i.e., they broadcast information, but don't receive any information back, so beacons themselves usually can't count the number of packets on the receiving end. (I guess you could technically use the Bluetooth "scan response" mechanism to do that, but it would require custom beacon hardware/firmware.)
Unfortunately, no, it will not do this by itself.
Google's Proximity Beacon Api is a server-side system that stores metadata about beacons (location, battery level, etc) It requires you to add special client code integrated with your app to submit detection data.
Similarly, detecting Eddystone-URL beacons generally requires you to add custom code to your app to do the detections and and present the URL to the user. (The only exception to this is for some Chrome for iOS users with the Chrome Today widget enabled, and no public system provides click through rates.)
Since your app must present the URL itself you really have to roll your own solution to this problem.
If I understand right, you should be able to achieve this by Google analytics campaign. Setup a campaign, add campaign url to ibeacon url and you should be able to check the details analytics through Google analytics.

format for data on nfc business cards

Apologies in advance if this question is a bit low end - I am only a quarter tech savy.
I am trying to produce some NFC enabled business cards and have been trialling some Mifare 1K compatible and also ultralight cards. I have been encoding the data using a Tag writer app via a Samsung GS3 and it seems to be performing well (ie when contact occurs the GS3 seamlessly asks which email account I would like to add the contact card too without requiring a particular installed app etc.
My question relates to a universal format for contact data that can allow the same type of outcome as occurred with the GS3 above with other phone formats when they inevitably become NFC enabled (ie Blackberry, Windows phone and the next I-phone). I have been reading about .VCF or Vcard as being the universal format however when I have encoded a mifare card with a contact card in this format and tried to get by GS3 to read it, the phone asks which application I would like to use. Is there a format I can use which will allow all phones to process and ask where the user would like to save the data without a tagreader app or similar?
Thanks
Brad
Unfortunately, there isn't a format that's universal for vCard on NFC tags. The closest thing to it is using a MIME type within the NDEF payload and referencing the vCard spec. The problem with this approach is that every cellphone OS or manufacturer may implement this differently.
The details lie in how the NFC standards body, NFC Forum, has not explicitly defined vCard as a Well Known Type. The format that data is stored on NFC tags is called NDEF. The NDEF specification lays out a structure and provides a TNF field to select WKF, MIME, EXT, and others. These TNF values map to what applications should process the NDEF data. In the case of WKT, typically a native application knows what to do with it (this is what you are asking for). However, WKT currently only specifies the following structures:
Text
URI
Smart Poster
Handover
Generic Control
Signature
Since there's no WKT for vCard, what Samsung's GS3 app is doing is using a MIME type. MIME has a similar structure to NDEF but not managed by the NFC Forum so Windows, Blackberry, etc. might choose to implement the vCard structure in a different way (using an EXT type, for instance) and still be NFC Forum compliant.
More about breaking down NDEF here.

Resources