Free Essay

Nfc-11-V1-0-Mwallet-Pos-Proposal-

In: Business and Management

Submitted By jrs20061
Words 5927
Pages 24
GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

Wallet-POS Proposal Version 1.0 03 May 2013
This is a Non-binding Permanent Reference Document of the GSMA
Security Classification: Non-confidential
Access to and distribution of this document is restricted to the persons permitted by the security classification. This document is confidential to the Association and is subject to copyright protection. This document is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permitted under the security classification without the prior written approval of the Association.

Copyright Notice
Copyright © 2013 GSM Association

Disclaimer
The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice.

Antitrust Notice
The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy.

V1.0

Page 2 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

Table of Contents
1 Introduction 1.1 System Overview 2 List of Abbreviations 3 Referenced Documents 4 User Story and Workflow 4.1 User Story 4.2 High-Level Workflows 4.2.1 Single Transaction – Couponing 4.2.2 Single Transaction – Loyalty 4.2.3 Single Transaction – Payment 4.2.4 Multiple Transactions – Couponing/Loyalty/Payment 5 Terminal Use Cases 5.1 Use case diagram 5.2 Use cases 5.2.1 getVasData 5.2.2 getCouponData / getVoucherData /getLoyaltyData 5.2.3 putVasData 5.2.4 redeemCoupon / redeemVoucher 5.2.5 issueCoupon / issueBonus / issueVoucher / issuePaymentSchemes 5.2.6 authenticate 5.2.7 Payment 6 Wallet/Terminal Interface Specification 6.1 Data Model 6.1.1 Simple Type 6.1.2 Basic Type 6.1.3 Constructed Types 6.1.4 Tag Overview 6.2 VASAppCardlet APDU Commands 6.2.1 Selection of VAS Application 6.2.2 GetData 6.2.3 PutData 6.2.4 VASApp Cardlet Response Codes 6.3 APDU Call Flows 6.3.1 Call Flow – Coupon Redemption 6.3.2 Call Flow – Loyalty Handling 6.3.3 Call Flow – Couponing/ Loyalty Handling 6.3.4 Call Flow – Couponing/Loyalty/Payment Handling 7 Guidelines for Terminal Developers Document Management Document History Other Information 4 5 5 6 6 7 8 8 9 10 11 12 12 13 13 14 14 14 15 15 15 16 16 16 16 19 21 22 22 24 24 26 27 27 28 29 30 31 33 33 33

V1.0

Page 3 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

1 Introduction
This document sets out a technical proposal for Point of Sale (POS) Terminal Manufacturers and covers interoperable formats for the provisioning and management of mobile NFC Value Added Services. This document is NOT a binding technical standard. It is only a proposal outlining a technical framework for POS Terminal Manufacturers which could be used as a platform to design new interoperable mobile NFC-based products and services. The GSMA recognises the need for an interoperable Value Added Services approach and has therefore constructed this document as an initial technical proposal. It is the intention of the document authors to deliver a more comprehensive, global framework based on the ideas outlined in this document and feedback from both the mobile and payment industry in Q3 2013. A Mobile Wallet is an open software framework which is about bringing secure NFC contactless credit cards, ticketing, access, and loyalty/couponing onto the mobile handset in an integrative way. This paradigm opens up the new opportunity to the 3rd-party developers, who want to introduce new attractive proximity services to the wallet customers. To give these developers – especially the Small and Medium-sized businesses (SMB) - a low barrier to entry, we will offer them a set of Wallet APIs.

Wallet API

Point ofTargeted Group Integration

Focus of document

this

On-Device API Device

The VAS developers who have mobile apps products but no contactless solutions POS System Developers

Terminal API

UICC

TSM API

Backend

The developers who contactless solutions.

have

vertical

Table 1.1: Wallet API Category

V1.0

Page 4 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

1.1

System Overview

Figure 1: System Overview In this document, we propose the Wallet/Terminal interface. Our target group is POS system developers.

2 List of Abbreviations
Term
AID APDU Cardlet ECR mWallet MNO NFC OTA POS RID

Description
Application Identifier Application Protocol Data Unit Java Card applet running on a smart card, such as UICC Electronic Cash Register Mobile Wallet Mobile Network Operator Near Field Communication Over the Air Point of Sale System Registered application provider Identifier

V1.0

Page 5 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal SMB TLV TSM UICC VAS Small and Medium-sized businesses Tag Length Value Trusted Service Manager Universal Integrated Circuit Card Value Added Service

Non-confidential

3 Referenced Documents
Term
[1]

Description
ISO/IEC 7816-4 Information technology -- Identification cards -- Integrated circuit(s) cards with contacts -- Part 4: Interindustry commands for interchange ISO/IEC 7816-5 Identification cards -- Integrated circuit cards -- Part 5: Registration of application providers ISO/IEC 8825-1:2008 Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) GMSA White Paper: Mobile NFC in Retail (Oct. 2012) http://www.gsma.com/mobilenfc/wp-content/uploads/2012/10/Mobile-NFC-inRetail-White-Paper-Oct-2012.pdf GS1 – Global Standards One http://www.gs1.org/ GlobalPlatform Card Specification v2.2.1 http://www.globalplatform.org/specificationscard.asp Contactless Services – GlobalPlatform Card Specification v 2.2 - Amendment C v1.0.1 http://www.globalplatform.org/specificationscard.asp GSMA White Paper: The Mobile Wallet (V1.0, September 2012) http://www.gsma.com/mobilenfc/wp-content/uploads/2012/10/GSMA-MobileWallet-White-Paper-Version-1-0.pdf GSMA NFC Handset APIs & Requirements (V 3.0, October 2012) http://www.gsma.com/mobilenfc/wp-content/uploads/2012/10/GSMA-NFCHandset-APIs-Requirements-V3.01.pdf GSMA NFC UICC Requirements (V 3.0, October 2012) http://www.gsma.com/mobilenfc/wp-content/uploads/2012/10/GSMA-NFC-UICCRequirements-Specification-V3.01.pdf

[2]

[3]

[4] [5] [6] [7]

[8]

[9]

[10]

4 User Story and Workflow
Definition and scope of Loyalty/Couponing: Loyalty Loyalty refers to a point collection centric bonus program that is targeted at one or more merchants. Here, the user gets a certain amount of points which are calculated based on a logic which the loyalty scheme provider defines. Therefore, every time the user makes a purchase, he forwards his loyalty customer identification number to the POS system via NFC which calculates the bonus points and adds it to the user’s balance. This loyalty type is POS IT backend centric, i.e. the wallet is only responsible for storing and forwarding
Page 6 of 32

V1.0

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

the user’s loyalty id. The loyalty bonus points processing and management is done via the POS system and loyalty provider's IT. Couponing Coupons enable particular user groups to get discounts or other benefits when making a purchase. Coupons can e.g. give a discount (relative or absolute) on the whole basket or on dedicated products. Certain coupons can also have preconditions which need to be fulfilled by the user in order to redeem the particular coupon (e.g. prepaid, get two and pay for one). The validation of coupons is done by the POS system. The coupon issuer’s motivation is to steer the user’s behavior by incentivizing certain products or purchase pattern. In this document, different kinds of couponing services will be covered under “couponing”, such as discount coupons, vouchers, prepaid gift cards, etc.

4.1

User Story

No. User story 1 As a Mobile Wallet user I want to redeem my coupons when tapping my phone against the contactless reader, so I can profit from the benefits provided by the coupons. As a Mobile Wallet user I want to participate in the retailer’s loyalty program when tapping my phone against the contactless reader, so I can collect bonus points. As a Mobile Wallet user I want to make a payment when tapping my phone against the contactless reader, so I don’t need any other means of payment. As a Mobile Wallet user I want to redeem coupons and make a payment when tapping my phone against the contactless reader, so I can profit from the benefits provided by the coupons and don’t need any other means of payment. As a Mobile Wallet user I want to redeem coupons and participate in the retailer’s loyalty program when tapping my phone against the contactless reader, so I can profit from the benefits provided by the coupons and collect bonus points. As a Mobile Wallet user I want to participate in the retailer’s loyalty program and make a payment when tapping my phone against the contactless reader, so I can collect bonus points and don’t need other means of payment. As a Mobile Wallet user I want to participate in the retailer’s loyalty program, redeem coupons and make a payment when tapping my phone against the contactless reader, so I can collect bonus points, profit from the coupons and don’t need other means of payment. Table 4.1: User Story

2

3

4

5

6

7

V1.0

Page 7 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

4.2

High-Level Workflows

In this chapter, we propose the high-level communication protocols between mWallet and POS/Terminal for the contactless loyalty/couponing/payment scenarios. In the communication, ECR software works in master mode towards the payment terminal and can initialize different transaction modes, such as couponing mode, loyalty mode, and payment mode. The sections 2.2.1 – 2.2.3 propose separate transaction flows for loyalty, couponing and payment, respectively, section 2.2.4 depicts one of the options detailing how a composited transaction would look like. The sequence of a composited transaction flows and the number of taps required for a transaction is dependent on the retail requirements and POS implementation. Remarks: 1) To ensure sinalling efficiency only the applicable couponing/loyalty/payment data for the given retail shop will be transferred from Wallet to ECR system. The parameter “filter criteria” is used in the transaction protocol is for this purpose. This document only supports the use of Retailer ID and Coupon/Loyalty Issuer ID. Transfere os data such as geo-location of retail stores could be included in the next version of the specification.. 2) New functionality, such as automated couponing and loyalty program could be introduced in the next version of the POS specification. This document focuses on the user pre-selection of loyalty/couponing data. 4.2.1

Single Transaction – Couponing

Scenario description: The user taps the mobile wallet against the contactless terminal, in order to get the selected coupons redeemed.

V1.0

Page 8 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

Mobile Wallet
ECR/Terminal
VASappCardlet

WalletPhoneApp
User pre-selects the coupons for redemption

Activate coupons for redemption

the cashier presses button and the ECR waits for phone tap retrieve coupon list for redemption(filter criteria) return coupon list

ECR processes coupon information and checks validity ECR calculates discounts After all products have been registered/scanned, ECR displays payment amount after consideration of all valid coupons Request to invalidate used coupons notify wallet UI return status

Figure 2: Single Transaction – Couponing Handling 4.2.2

Single Transaction – Loyalty

Scenario description: The user taps the mobile wallet against the contactless terminal, in order to collect loyalty points.

V1.0

Page 9 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

Mobile Wallet
ECR/Terminal
VASappCardlet

WalletPhoneApp
User pre-selects a loyalty card

Activate loyalty card Retrieve user selected loyalty card return loyalty card data

Check loyalty card applicability and validity Calculate loyalty points

Figure 3: Single Transaction – Loyalty Handling

4.2.3

Single Transaction – Payment

Scenario description: The user taps the mobile wallet against the contactless terminal, in order to make a payment.

V1.0

Page 10 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

Mobile Wallet
ECR/Terminal
VASappCardlet

WalletPhoneApp
User pre-selects a payment card

Activate payment card retrieve payment card return payment card token

Check card applicability and validity

Do payment

Figure 4: Single Transaction – Payment Handling 4.2.4

Multiple Transactions – Couponing/Loyalty/Payment

Scenario description: The user taps the mobile wallet against the contactless terminal, in order to redeem coupons, make payment, as well as collect loyalty points. How to organize the transaction sequence and realize the above scenario is dependent on the POS implementation. Figure 5 depicts just one of the possible options.

V1.0

Page 11 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

Figure 5: Multiple Transactions – ouponing/Loyalty/Payment Handling

5 Terminal Use Cases
5.1 Use case diagram

V1.0

Page 12 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

NFC handheld

putVasData *

«uses» «uses» «uses» «uses» «uses»

«uses»

«uses»

issueCoupon issuePaymentScheme redeemVoucher redeemCoupon issueBonus authentification «uses» «uses» «uses» «uses» «uses»

issueVoucher

* «uses» * * *

payment

POS Terminal getVasData * «uses» «uses» «uses» «uses» getCouponData

getVoucherData

getTicketData getLoyaltyData

Figure 6: Use case diagram.

5.2

Use cases

A use cases is a description of WHAT a system should do and not HOW a system should do something. The following chapters will give a detailed description of the most importatnt use cases.

5.2.1

getVasData

The use case getVasData uses some other use cases such as getCouponData, getVoucherData, to get data from the Wallet. No. 1
V1.0

Description POS terminal sends a command to the Wallet to get the
Page 13 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

No.

Description requested data.

Table 2: Options to get data from the Wallet 5.2.2

getCouponData / getVoucherData /getLoyaltyData

This use case describes the retrieval of a list of all the user selected coupon/voucher/loyalty data from the Wallet. No. 1 Description POS terminal sends a command to the Wallet to get a list of all selected coupon/voucher /loyalty data.

Table 3: Options to get coupon/voucher/ticket/loyalty data from the Wallet 5.2.3

putVasData

This use case putVasData combines other use cases such as issueCoupon, issueVoucher, to write/put data to the Wallet in one step. No. 1 Description POS terminal sends a command to the Wallet to write/put data to the Wallet.

Table 4: Options to write/put data to the Wallet 5.2.4

redeemCoupon / redeemVoucher

This use case confirms the redemption of a list of coupons/vouchers which were retrieved from the Wallet. In case of an error (e.g., NFC communication failure, etc.), the complete transaction will be reversed! No. 1 Description POS terminal sends a command to the Wallet to redeem a list of coupons/vouchers.

Table 5: Options to redeem coupons/vouchers in the Wallet

V1.0

Page 14 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

5.2.5

issueCoupon / issueBonus / issueVoucher / issuePaymentSchemes

This use case describes the issuing of a list of new coupons/bonus/vouchers/payment Schemes to the Wallet. The transaction is only considered to be successful if each individual element is successfully issued. In case of any error the complete transaction has to be reversed! No. 1 Description POS terminal sends a command to the Wallet to issue a list of coupons/bonus/vouchers/paymentSchemes to the Wallet.

Table 6: Options to issue new coupons/bonus/voucher 5.2.6

authenticate

This use case describes the complete authentication process Remark: Currently, the is used as identification. The authentication between POS terminal and Wallet will be included in a future version of the specification. No. 1 Description POS terminal processes the complete authentication with the Wallet. In the first phase only the retailer ID is written to the Wallet. In the next phases a real authentication process will be implemented.

Table 7: Options to process the authentication process with the Wallet
5.2.7

Payment

This use case describes the complete payment process and it can be extended with other use cases such as redeemCoupon, issueCoupons etc. No. 1 Description POS terminal processes the complete payment with the Wallet and writes/puts data to the Wallet.

Table 8: Options to process the payment process with the Wallet

V1.0

Page 15 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

6 Wallet/Terminal Interface Specification
This section proposes a Wallet-Terminal APDU interface to introduce the new NFC VAS services, such as, loyalty and couponing. The APDU communication is carried out via NFC card emulation mode and the POS serves as master of the communication. Additionally, the data structures used for communication are specified. Currently, no security considerations are taken into account – these will be added at a later stage by adding authentication APDUs, constraints, and access control lists to the specification.

6.1

Data Model

The data objects are encoded to Basic Encoding Rules (BER).0 6.1.1
Type

Simple Type
Length Values ‘00’, ‘01’ (False, True) ‘00’ … ‘FF’ (-128 … 127) ‘00’ … ‘FF’ (0 … 255) ’00 00’ … ‘FF FF’ (-32768..32767) Description Boolean 8-bit signed number 8-bit unsigned number 16-bit signed short (high byte, low byte)

Boolean 1 Byte UInt8 Short 1 1 2

UInt16 UInt32

2 4

’00 00’ … ‘FF FF’ (0 … 65535) ’00 00 00 00’ … ‘FF FF FF FF’ (0 … 4294967295)

16-bit unsigned short (high byte, low byte) 32 bit unsigned integer, most significant byte first

UInt64

8

’00 00 00 00 00 00 00 00’ … ‘FF FF FF FF FF FF FF FF’ (0 … 18446744073709551615)

64 bit unsigned integer, most significant byte first

Table 9: Simple Data Type Table 6.1.2

Basic Type

The basic data types defined in this section are simple data types embedded into BER-TLV tags and will be used through the protocol specifications. UniqueID Unique identifier of a token, needed for later reference on the wallet side. Field TAG LEN VALUE Byte Type Byte Length 2 var. var. Value 9F 20

Table 10Table 6.2: Basic Type – UniqueID TokenData
V1.0 Page 16 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

Transparent token data, which is not interpreted by the wallet, but by retail system. Field TAG LEN VALUE Byte Type Byte Length 2 var. var. Value 9F 21

Table 11Table 6.3: Basic Type – TokenData WalletData This data is interpreted by the wallet, in order to get the loyalty and coupons presented in the wallet. Field TAG LEN VALUE Byte Type Byte Length 2 var. var. Value 9F 22

Table 12: Basic Type – WalletData ActionSpecifier Describes the action, which should be performed on an item with a PUT DATA command. Create(0x00), Delete(0x01), Update(0x02), mark as redeem(0x03), Invalidate(0x04). Field TAG LEN VALUE Byte Type Byte Length 2 var. var. Value 9F 23

Table 13: Basic Type – ActionSpecifier
ProtocolVersion Contains version information for the used protocol. Field TAG LEN VALUE Byte Type Byte Length 2 var. var. Value 9F 24

Table 14: Basic Type – ProtocolVersion
VASappID Unique identification of the UICC application “VASappCardlet”. This ID is used by the terminal to select the application. (See chapter 4.2.1) Field
V1.0

Type

Length

Value
Page 17 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

TAG LEN VALUE

Byte

2 var.

9F 25

Byte

var.

Table 15: Basic Type – VASappId SecuritySpecifier Describes, what type of security has to be applied for a certain token. Field TAG LEN VALUE Byte Type Byte Length 2 var. var. Value 9F 26

Table 16: Basic Type – SecuritySpecifier Signature Digital signature for token data. Field TAG LEN VALUE Byte Type Byte Length 2 var. var. Value 9F 27

Table 17: Basic Type – Signature RetailerID The unique identification of a retailer. This id is used by the wallet as one of the filter criteria to transfer the applicable coupon data to the target POS system. To be noted, we define only the meta-data-structure of the RetailerID in TLV format, and it is open to adopt any standard for its data. For example, use the relevant GS1 standards 0. Field TAG LEN VALUE Byte Type Byte Length 2 var. var. Value 9F 28

Table 18: Basic Type – RetailerID LoyaltyIssuerID The unique identification number of a loyalty program. This id is used by the wallet as one of the filter criteria to transfer the applicable loyalty data to POS. To be noted, we define only the meta-data-structure of the LoyaltyIssuerID in TLV format, and it is open to adopt any standard for its data. For example, use the relevant GS1 standards 0.
V1.0 Page 18 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

Field TAG LEN VALUE

Type Byte

Length 2 var.

Value 9F 29

Byte

var.

Table 19: Basic Type – LoayltyIssuerID VoucherIssuerID The unique identification number of a couponing issuer. This id is used by the wallet as one of the filter criteria to transfer the applicable coupon data to POS. To be noted, we define only the meta-data-structure of the VoucherIssuerID in TLV format, and it is open to adopt any standard for its data. For example, use the relevant GS1 standards 0. Field TAG LEN VALUE Byte Type Byte Length 2 var. var. Value 9F 2A

Table 20: Basic Type – VoucherIssuerID PaymentSchemeID The unique identification number of a payment scheme. This id is used by the wallet to check if the selected payment scheme is possible. If not, the wallet could suggest the user a valid payment scheme. Field TAG LEN VALUE Byte Type Byte Length 2 var. var. Value 9F 2B

Table 21: Basic Type – PaymentSchemeID 6.1.3

Constructed Types

The constructed data types defined in this section are composed of BER-TLV encoded basic types or further constructed types and will be used through the protocol and memory layout specifications. NOTE: The sequence of the different tags within constructed tags may be variable. Token Collection of all data, related to a certain token. Field TAG Type Byte Length 1 Value 0xB0 Mand./Opt. M

V1.0

Page 19 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

LEN UniqueID TokenData WalletData Further optional data ….

var. var. var. var.

M M M O O

Table 22: Constructed Type - Token PaymentTokenList List of payment tokens Field TAG LEN Token 1 … n Token Type Byte Length 1 var. var. Value 0xA0 Mand./Opt. M M O

Table 23: Constructed Type - PaymentTokenList CouponTokenList List of coupon tokens Field TAG LEN Token 1 … n Token Type Byte Length 1 var. var. Value 0xA1 Mand./Opt. M M O

Table 24: Constructed Type - CouponTokenList LoyaltyTokenList List of loyalty tokens Field TAG LEN Token 1 … n Token Type Byte Length 1 var. var. Value 0xA2 Mand./Opt. M M O

Table 25: Constructed Type – LoyaltyTokenList

V1.0

Page 20 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

CouponTokenList List of coupon tokens Field TAG LEN Token 1 … n Token Type Byte Length 1 var. var. Value 0xA3 Mand./Opt. M M O

Table 26: Constructed Type – CouponTokenList TicketTokenList List of ticket tokens Field TAG LEN Token 1 … n Token Type Byte Length 1 var. var. Value 0xA4 Mand./Opt. M M O

Table 27: Constructed Type – TicketTokenList AccessTokenList List of access tokens Field TAG LEN Token 1 … n Token Type Byte Length 1 var. var. Value 0xA6 Mand./Opt. M M O

Table 28: Constructed Type – AccessTokenList

Tag list List of Tags Field TAG LEN Tag of Token 1 … n Bytes Type Byte Length 1 var. var. Value 0x5C Mand./Opt. M M O

Table 29: Constructed Type – TagList
6.1.4
Tag 9F20

Tag Overview
Name UniqueID

V1.0

Page 21 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal 9F21 9F22 9F23 9F24 9F25 9F26 9F27 9F28 9F29 9F2A 9F2B B0 A0 A1 A2 A3 A4 A5 A6 5C TokenData WalletData ActionSpecifier ProtocolVersion VASappID SecuritySpecifier Signature RetailerID LoyaltyIssuerID VoucherIssuerID PaymentSchemeID Token PaymentTokenList CouponTokenList LoyaltyTokenList VoucherTokenList TicketTokenList reserved AccessTokenList Tag list

Non-confidential

Table 30: Tag overview

6.2

VASAppCardlet APDU Commands

The VASappCardlet is a JavaCard applet running on UICC and it manages the VAS communication with POS system via NFC card emulation mode. The environment, i.e., Handset/UICC/mWalletPhoneApp should fulfil the requirements defined by GSMA specification according to 00Error! Reference source not found.. 6.2.1

Selection of VAS Application

Like other UICC applets, the VASappCardlet is identified and selected by its application identifier (AID). The standard selection command 0 is called by POS system to make the VASappCardlet selected and ready for further APDU processing. The VASappAID is the application identifier of the GSMA and related MNO´s VASappCardlet.

V1.0

Page 22 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

The encoding of the VASappCardlet AID is defined according to the following table:

Meaning

AID-Coding 0xA0:0x00:0x00:0x05:0x59

RID
This RID is internationally unique and reserved for applications according this specification

Application Code

0x00:0x01 (e.g. GSMA application VASappCardlet)

Mobile Country Code
(three digits BCD, right aligned, padded with F, e.g. 0xF2:0x62 Germany)

0xFX:0xXX

Mobile Network Code
(two or three digits BCD, right aligned, padded with F, e.g. Telekom Deutschland 0xFF:0x01)

0xFX:0xXX or 0xFF:0xXX

Application Provider Field (optional, length 0-5) Additional provider specific data 0xXX:0xXX:0xXX:0xXX:0xXX

Table 31: VASAppCardlet AID

Field name CLA INS P1 P2 Lc Data Le

Type Byte Byte Byte Byte UInt8

Length 1 1 1 1 1

Value 0x00 0xA4 0x04 0x00 0xXX VASappCardle t AID

Description

Byte

1

Length expected Table 32: Select APDU request

Field Data

Type FCI template

Length Value 0..255

Description File control (optional) information

V1.0

Page 23 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

Status Code e.g.

Short

2

XX XX 90 00 6A 82

SW1 SW2 (defined in Table 14) Operation completed File not found successfully

Table 33: Select APDU response 6.2.2

GetData

With the command GetData, data objects can be retrieved from the handset. The requested objects are specified within the TagList in the data field of the command. The response data field shall be the concatenation of the data objects referenced in the TagList, in the same order. The advantages of this command are that multiple data objects can be read out in one single step, and that the POS side can decide very flexibly, which data objects it wants to read.

Field CLA INS P1 P2 Lc Data Le

Type Byte Byte Byte Byte UInt8 TagList Byte

Length 1 1 1 1 1 Var. 1

Value 0x00 0xCB 0x00 0x00 0xXX

Description

Length expected Table 34: GetData APDU request

Field Data Status Code

Type

Length 0..255

Value

Description

Short

2

XX XX 90 00 67 00 6A 80

SW1 SW2 (defined in Table 14) Operation successfully completed Wrong data length Incorrect parameters in the Data field

Table 35: GetData APDU response 6.2.3

PutData

With the command PutData, data objects can be sent to the handset, e.g. the RetailerID. Furthermore, the status of tokens can be updated, e.g. coupons can be marked as redeemed. For this purpose, the tokens have to be referenced by their UniqueID and an ActionSpecifier has to be given. With the PutData command, the POS side has the
V1.0 Page 24 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

possibility to transport multiple data objects and update multiple tokens in one step flexibly by simply adding them to the data field respectively the corresponding list and adding the list to the data field. Field CLA INS P1 P2 Lc Data Type Byte Byte Byte Byte Byte Length 1 1 1 1 1 0..255 Table 36: PutData APDU request Value 0x00 0xDB 0x00 0x00 Data Size Description

Field

Type

Length Value 2 XX XX 90 00 9C 01 9C 06

Description SW1 SW2 (defined in Table 14) Operation successfully completed Insufficient memory onto the UICC to complete the operation Access denied

Status Code Short

Table 37: Data APDU response

V1.0

Page 25 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

6.2.4
SW1 90 63

VASApp Cardlet Response Codes
SW2 00 00 Description Operation successfully completed (ISO) Unsuccessful authentication (for an ISO Verify). Multiple consecutive failures cause the PIN to block. (ISO)

67 69 6A 6A 6A 6A 6D 6E 9C 9C 9C 9C 9C 9C 9C 9C 9C 9C 9C 9C 9C 9C

00 83 80 82 86 88 00 00 01 02 03 05 06 07 08 0B 0C 0D 0E 10 11 12

Wrong data length (regards Le & Lc) (ISO) The PIN referenced into an ISO Verify command is blocked. (ISO) Incorrect parameters in the Data field. (ISO) File not found. (ISO) Incorrect parameters P1-P2 (ISO) Referenced data not found. (ISO) Wrong instruction code. (ISO) CLA (for INS) not supported. (ISO) Insufficient memory onto the UICC to complete the operation Unsuccessful authentication. Operation not allowed because of the internal state of the VASapp Cardlet The requested feature is not supported either by the UICC or by the VASapp Cardlet Unauthorized (access denied) An object either explicitly or implicitly involved in the operation was not found Object already exists The signature provided in a verify operation was incorrect. Authentication operation not allowed because specified identity is blocked. An error occurred. No further information is given. Input data provided either in the APDU or by means of the input object is invalid. Incorrect P1 value Incorrect P2 value Expected length of the received data is not correct.

Table 38: VASappCardlet response status codes

V1.0

Page 26 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

6.3

APDU Call Flows

Based on the defined APDU commands and data model in the previous sections, we can now map the high-level transaction workflows defined in 4.2 to the X-Taps(X=1/2) based APDU call flows. The number of taps required for a specific transaction depends on service provider. In the following subsections, we use a 2-taps pattern as example to show how the mapping works in practice using the defined APDU commands. 6.3.1

Call Flow – Coupon Redemption

Figure 7: APDU Call-Flow: Coupon Redemption with mWallet

V1.0

Page 27 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

6.3.2

Call Flow – Loyalty Handling

Figure 8: APDU Call-Flow: Loyalty Handling with mWallet

V1.0

Page 28 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

6.3.3

Call Flow – Couponing/ Loyalty Handling

Figure 9: APDU Call-Flow: Coupon Redemption and Loyalty Handling with mWallet

V1.0

Page 29 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

6.3.4

Call Flow – Couponing/Loyalty/Payment Handling

Figure 10: APDU Call-Flow: Coupon/Loyalty/Payment with mWallet

V1.0

Page 30 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

7 Guidelines for Terminal Developers
Questions and Answer Section: Question 1. How are multiple TLV objects retrieved using the single GetData command? Examples: Retrieve WalletID and list of coupon tokens: send : 0x00 0xCB 0x00 0x00 0x05 0x5C 0x03 0x9F 0x25 0xA1 0x00 receive : 0x9F 0x25 0x10 0xA0 0x00 0x00 0x00 0x87 0x10 0x03 0xFF 0x49 0x94 0x20 0x89 0xFF 0x01 0x02 0x01 0xA1 0x17 0xB0 0x15 0x9F 0x20 0x02 0x12 0x34 0x9f 0x21 0x0D 0x39 0x38 0x32 0x33 0x32 0x36 0x32 0x33 0x36 0x31 0x32 0x30 0x34 0x90 0x00 WalletID = A0000000871003FF49942089FF010201 CouponToken: UniqueID =1234 TokenData=”9823262361204” Retrieve list of loyalty tokens: send : 0x00 0xCB 0x00 0x00 0x03 0x5C 0x01 0xA2 0x00 receive : 0xA2 0xXX 0xB0 0xXX 0x9F 0x20 0x02 0x12 0x34 0x9f 0x21 0xXX 0x90 0x00 UniqueID =1234 TokenData= Retrieve lists of payment and coupon tokens: send : 0x00 0xCB 0x00 0x00 0x04 0x5C 0x02 0xA0 0xA1 0x00 receive : 0xA1 0x17 0xB0 0x15 0x9F 0x20 0x02 0x12 0x34 0x9F 0x21 0x0D 0x39 0x38 0x32 0x33 0x32 0x36 0x32 0x33 0x36 0x31 0x32 0x30 0x34 0xA2 0xXX 0xB0 0xXX 0x9F 0x20 0x02 0x34 0x12 0x9f 0x21 0xXX 0x90 0x00 Coupon: UniqueID =1234 TokenData=”9823262361204” Loyalty: UniqueID =3412 TokenData= Retrieve lists of payment, coupon, loyalty and access tokens: send : 0x00 0xCB 0x00 0x00 0x06 0x5C 0x04 0xA0 0xA1 0xA2 0xA3 0x00 receive : …….

V1.0

Page 31 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

NOTE: 0x5C is the tag for a tag list. See [2], chapter 8.5.1. NOTE: from ISO specification [2], chapter 7.4.2: If the information is too long for a single response data field, the card shall return the beginning of the information followed by SW1SW2 set to ’61 XX’. Then a subsequent GET RESPONSE provides ‘XX’ bytes of information. The process may be repeated until the card sends SW1- SW2 set to ’90 00’. Question 2. How can multiple TLV objects be written with a single PutData command? Examples: Redeem one coupon token: send : 0x00 0xDB 0x00 0x00 0x0D 0xA1 0x0B 0xB0 0x09 0x9F 0x20 0x02 0x12 0x34 0x9F 0x23 0x01 0x03 receive : 0x90 0x00 Token: UniqueID =1234 ActionSpecifier=0x03 NOTE: If more than one token (per list) is sent, an error in one token will reverse the complete transaction. To get a detailed error message, every token has to be send by one putData command. Send RetailerID to wallet: send : 0x00 0xDB 0x00 0x00 0x07 0x9F 0x09 0x04 0x47 0x11 0x08 0x15 receive : 0x90 0x00 RetailerID = 47110815

Question
3. How does the Chaining Mode work with GetData/PutData? When transmitting data too long for one single command, the chaining mechanism, as described in [2], chapter 5.1.1.1, shall be used. Then bit 5 (8 MSB … 1 LSB) of the CLA byte indicates the last part of a chain:  If bit 5 is set to 0, then the command is the last or only command of a chain.  If bit 5 is set to 1, then the command is not the last command of a chain.

V1.0

Page 32 of 32

GSM Association Official Document NFC.11 - Wallet-POS Proposal

Non-confidential

Document Management
Document History

Version

Date

Brief Description of Change
First GSMA version submitted for DAG & PSMC Approval

Approval Authority
DAG PSMC#112 &

Editor Company

/

1.0

22/03/2013

Jürgen Göbel, Deutsche Telekom

Other Information
It is our intention to provide a quality product for your use. If you find any errors or omissions, please contact us with your comments. You may notify us at prd@gsma.com Your comments or suggestions & questions are always welcome.

V1.0

Page 33 of 32…...

Similar Documents

Free Essay

Proposal

...[pic] PROPOSAL PERENCANAAN USAHA (Cheese-Potato) Oleh : (Selviana & 1142087) Kelas : 3GAPA Dosen: Wisnu Yuwono, SE.,MM UNIVERSITAS INTERNASIONAL BATAM BATAM 2012 DAFTAR ISI HALAMAN SAMPUL i DAFTAR ISI ii A. LATAR BELAKANG MASALAH 1 B. TUJUAN DAN MANFAAT USAHA 2 C. GAMBARAN UMUM RENCANA USAHA 2 D. PERENCANAAN OPERASIONAL 3 E. PERENCANAAN PEMASARAN 4 F. PERENCANAAN KEUANGAN 6 G. JADWAL KEGIATAN 8 H. LAMPIRAN 9 A. LATAR BELAKANG MASALAH Apa sebab munculnya makanan “Cheese-Potato” ? Kita bisa melihat bahwa pada zaman sekarang selalu muncul makanan cemilan baru yang unik dan spesial. Demikin juga dengan Cheese-Potato yang saya ciptakan ini. Makanan ini berbahan utama sesuai dengan nama produk makanan ini, yaitu potato dan cheese atau yang biasa kita kenal dengan kentang dan keju. Bagaimana rasanya Cheese yang di campur dengan kentang goreng? Sungguh tidak dapat diungkapkankan. Selain rasa asin, “Cheese-Potato” ini juga memiliki rasa manis. Dari mana rasa manisnya? Rasa manisnya adalah berasal dari topping blueberry dan susu yang taburkan di atas kentang. Jadi, makanan “Cheese-Potato” ini memiliki rasa asin dan manis yang tidak dapat diungkapkankan. Hanya dapat dirasakan dengan menyicipi makanan tersebut. Dan saya percaya bahwa makanan ini akan jadi populer dan digemari banyak orang dalam umur dan kalangan......

Words: 1036 - Pages: 5

Premium Essay

Proposal

...and why object-oriented languages are necessary to today’s working environment. How the project topic is influenced by (and/or influences) history, culture, media, and/or the arts from a national or world perspective These are some of the major advantages of OOP. Simplicity: software objects model real world objects, so the complexity is reduced and the program structure is very clear. Modularity: each object forms a separate entity whose internal workings are decoupled from other parts of the system. Modifiability: it is easy to make minor changes in the data representation or the procedures in an OO program. Thus, this will influence the world perspective that programming is not so hard. Audience The intended audiences for my proposal are software development companies. I believe that I can encourage them to combine or advance their technology to not only improve their work productive, but to boost their employee’s manner. Audience Position The audience may already be alert to this concept of introducing object-oriented languages in the workplace. Newer, more lively programmers will be more interested to this idea than they seasoned, experienced programmers who are set in their ways and castoff technology in general. I will communicate that learning styles have shifted in today’s generation and programmers should accommodate as needed. The advantages offset the disadvantages (like cost) and will inspire failing companies to perform at a level that they......

Words: 742 - Pages: 3

Premium Essay

Pos Systems

...Efficiency and Collaboration Proposal Information and communications systems technology are technologies and services that enables information to be accessed, stored, processed, transformed, or distributed in business all across the world. The use of information technology has improved the quality of business within organizations so significantly that information systems are the primary source for business growth, which is the result of why businesses are becoming so successful. During the last decade, information technology systems have changed greatly the landscape of the financial markets, competitive markets, productivity as well as government involvement. Therefore, Learning Team E will explain the new project that sales team at Party Plate, which is a company that manufactures decorative paper plates and napkins for special events, has been assigned to do in regard to improving the efficiency of the current information systems used in the sales department. However, Party Plate sales department is currently using Microsoft Excel to track all personnel data, but want to migrate to a relational database like Microsoft Access. In addition, Learning Team E will identify potential collaborative software that may improve internal communications and help streamline some of the work processes for the sales department at Party Plate Company. The Usefulness of Converting Data from Microsoft Excel into a Microsoft Access Database Microsoft Excel has been around for 25......

Words: 773 - Pages: 4

Free Essay

Nfc Technology

...NFC Near Field Communication (NFC) technology makes life easier and more convenient for consumers around the world by making it simpler to make transactions, exchange digital content, and connect electronic devices with a touch (NFC 2011). Cell phone carriers, such as AT&T, use NFC capabilities in their cell phones as a selling point to the consumer. Some companies, like Samsung, use NFC TecTiles to help their consumers find what they need with just a simple glide of their phone. Major credit card companies use the NFC technology in their credit cards to make it simpler for customers to pay for merchandise without having to swipe there card. With the advancement of the first telephone to modern day smartphones, AT&T has been there. AT&T has always had a unique way of staying ahead and on track with the quick advancement of technology. Numerous smartphone application developers have tried to create software that will allow you to no longer worry about having your wallet. As long as you have your smartphone and the application, you still have the ability to pay for merchandise. With AT&T’s new application, ISIS, Near Field Communication technology is something they are continuing to move forward with. ISIS is a smartphone application that has been successfully designed to replace your wallet and put all your information in one program. Some people might say it sounds crazy, but Ben Spencer (2013) had done studies that have shown, “that cell phone users......

Words: 1482 - Pages: 6

Free Essay

Intro of Pos

...improves efficiency, reduces human error and allows information to flow to an infrastructure without a time consuming data input process. There is also less chance of handwritten orders being misread and a higher customer turnaround as customers will be served faster. In accordance to this, this system is a proposal on computerized ordering system for Pizza, other foods and beverages. The system is developed specially to meet the needs of Seafront. Point-of-Sale Inventory System is one of the essential components of a successful business. It is a modern replacement for the cash register in retail applications. It can help to record securely all the sales and customer’s orders, track products which are poor on business’ sales and of course manage inventory.       This particular system can improve the way, the small and mid-sized businesses do their inventory and sale transactions. It will aid some of the common problems facing by business industries, that in this era of modernization, still using a manual process of inventory. Common problems like slow inventory process, lost records, inventory shortages, and high risk of errors can affect the whole business. A manual POS Inventory System can affect the whole business process in terms of sales and confidential document security because a manual process is not reliable enough. PURPOSE AND DESCRIPTION Inventory, Purchasing, and Invoice System is used for Seafront restaurant. This system help with tab and table ordering......

Words: 570 - Pages: 3

Premium Essay

Nfc Technology

...NFC technology uses the following smart devices: • NFC – enabled mobile phone: NFC enabled mobile phones, which also are referred to as NFC mobiles, are the most important NFC devices. Currently, integration of NFC technology with mobile phones creates a big opportunity for the ease of use, acceptance and spread of NFC ecosystem. • NFC reader: An NFC reader is capable of data transfer with another NFC component. The most common example is the contactless point of sale (POS) terminal, which can perform contactless NFC-enabled payments when the NFC device is touched against the NFC reader. • NFC tag: An NFC tag is actually an RFID tag that 8. How Does The NFC Technology Work : NFC works in an intuitive way. The touching action is taken as the triggering condition for NFC communication. Two NFC devices immediately start their communication when they are touched. The NFC application is designed so that when the mobile or the device touches some other NFC component that contains the expected form of data, it boots up. Hence, the user does not need to interact with the mobile device anymore but just touches one appropriate NFC device, which may be an NFC tag, an NFC reader, or another NFC-enabled mobile phone, because the coupling occurs intuitively and immediately. When you consider ubiquitous computing requirements, this is a useful property of NFC communication. For each NFC communication session, the party who initiates the communication is called the initiator,......

Words: 604 - Pages: 3

Free Essay

Aprenda a Usar Tecnología Nfc

...Artículo de tecnología Fundamentos de investigación Nelson Daza – 68131554 Febrero 25 2013 Tabla de Contenido Aprenda las ventajas de usar la tecnología NFC 3 Turismo inteligente 4 Salud en su móvil 4 Billetera virtual 4 El NFC en autos 4 Aprenda las ventajas de usar la tecnología NFC Este sistema permite enlazar aparatos con solo acercarlos sin configuraciones adicionales. Liberarse de cables para compartir información entre dispositivos móviles, para recargarlos o lograr con un toque que smartphones, tabletas, equipos de audio, sistemas de pago, vehículos y electrodomésticos ‘hablen’ e interactúen, hace parte de los desarrollos alcanzados con la tecnología inalámbrica de corto alcance, Near Field Communications (NFC). Como si fuese un truco de magia, en el que las conexiones físicas desaparecen para transmitir información, los equipos y plataformas que trabajan con NFC permiten, en segundos, conectar un dispositivo con múltiples aparatos móviles a través de la identificación de radiofrecuencia (RFID). La tecnología, que se prueba desde el 2004, despegó en Europa en el 2010 con los primeros ensayos para realizar transacciones financieras a través de teléfonos móviles. A raíz de esto, compañías como Visa, Master Card, Telefónica, Citibank y Google, con su Google Wallet, entre otros, ya cuentan con sistemas de pago con NFC desde el 2011, convirtiendo así a los smartphones en billeteras inteligentes. A propósito, durante los pasados Juegos Olímpicos de Londres, Visa......

Words: 586 - Pages: 3

Premium Essay

Pos Thesis

...these functions include sales, manufacturing, warehousing, ordering and receiving. In this way it is possible to keep a record of all files. Since manual inventory consumes a lot of time it would be helpful to build a system that can less the cost with the stated problems, the researchers will develop, design and implement a system called Saint Rita’s College of Balingasag Point of Sales System (SRCB POS). Point of Sales is the place where a retail transaction is completed. It is the point of sales which a customer makes a payment in exchange for goods or services. At the point of sale it would calculate the amount owed by the customer and provide options for the customer to make payment. As part of it services, researchers implement a system that is designed to provide capabilities for storing, searching, updating the all files of goods or products, adding a data, delete and edit. One of the important of POS system is inventory system for the identification in receiving and selling inventory items. Determine when to record low stock items or to record the sale of specific items. POS can also monitor the cost of goods sold, purchase price and sale price. All of the deliveries are recorded and listed from this system. There will be a separation for the record of all goods. Expenses will be subtracted to the gross income and the result will be the net income with the use of this study. St. Rita’s College of Balingasag Pantry is using the manual processing of recording the......

Words: 7070 - Pages: 29

Free Essay

Nfc Paper

...Communication NFC, or near field communication, is a type of connection that is established between two devices when touched together or brought close to each other. It is very similar to Bluetooth but with a more limited range and ease of access. NFC is used to transfer data and files between devices very fast and easily. Android features “Android Beam” and devices such as Nokia, Samsung, BlackBerry, and Sony have used NFC to pair external devices. NFC can also be used to share media, contact information, and even pair up to play games. Perhaps one of the most popular uses is the ability to pay using your device. You can store card information on the device and use the device at a designated terminal to pay. There are many pros and cons to using NFC. Some positive features include its versatility, convenience, and security in regards to card info. Some concerns with data security include the use of jammers to destroy data and “spying” with antennas. Another con of the technology is the expense of buying NFC compatible devices. Although larger companies may not have trouble paying for the equipment, smaller and privately owned companies can’t always keep up. Because this technology is fairly new, people are still finding out new uses for NFC. You can use it to share a long Wi-Fi password through transfer instead of paper. Using NFC tags, you can set up a place to tap in order to start up your computer upon arrival. It can even be used while driving. By setting up a NFC......

Words: 334 - Pages: 2

Free Essay

Network Proposal

...PROPOSAL FOR ABC NETWORKING AND CYBER-PHYSICAL SYTEMS SAFETY Name: Institutional Affiliation: Course: Date: Table of Contents SECTION I: CONSULTANT …………………………..............................................2-5 SECTION II: OUR UNDERSTANDING OF ABC REQUIREMENTS…………….5 SECTION III: OUR PROPOSAL……………………………………………………..6-16 SECTION IV: PROJECT RESOURCE……………………………………………..….17-18 Reference………………………………………………………………………………… I.0. Introduction BLM COMMUNICATIONS Your Ref… Our Ref: ABC/14/9 26 September 2014 Information Technology/ Systems Engineer ABC, Department of ICT Address: Dear Sir/Madam, RE: PROPOSAL FOR NETWORKING AND CYBER-PHYSICAL SYTEMS SAFETY Proposal on enterprise-wide solution for networking topology, network devices, IP infrastructure, and network security innovative safety procedures and measures for implementation to provide safer environments for networking and electronic document management software. We look forward for your favorable consideration. Sincerely, Name, LEAD CONSULTANT 1. Business Questionnaire |Company Registration No. 490998 | |PIN Number P051564540Q ...

Words: 2114 - Pages: 9

Premium Essay

Project Proposal

...Provisional title The provisional title of the following project proposal is “LSA Logistics UK innovative shipping of artworks” Hypothesis for the project This project aims to investigate whether there is an appropriate field in United Kingdom for the idea of innovative shipping of artworks to grow up and be successful. According to Valerie J. Easton and John H. McColl (1997) there are several kinds of hypothesis such as: null, alternative, simple and composite hypothesis. In this particular project I choose the alternative hypothesis as a tool for investigation. In other words this means that I will try to explain and prove that the new idea of shipping service will be successful and at the same time that it will provide a lot of advantages for the company LSA Logistics UK not only when it comes to finance returns, but when it comes to gaining new loyal clients and excellent reputation, too. Valerie J. Easton and John H. McColl (1997) claim that alternative hypothesis should include a proper investigation, which conclusion should explain why the newly invented product or service will be beneficial and needed for a sufficient number of potential clients. To make an alternative hypothesis a person should have objects or services to compare. In this case I have a great deal of competitors, which do offer this type of service. So at the end of the investigation I should be able to conclude that the new highly improved service of LSA Logistics UK is better than the services......

Words: 4288 - Pages: 18

Premium Essay

Nfc in Universities

...study in universities “Enabling NFC in Universities” (NFC enabled Student Identification card for University students) Contents 1.Executive summary: 4 2. Description of the project 6 2.1 The projects intended location 6 2.2 The environment surrounding it 6 2.3 Availability of the resources required to start the business 6 2.4 Business goals and objectives 7 2.5 History of the project 7 2.6 Motivation to start business 7 3. Market Description 8 3.1 Target market 8 3.2 Entering the market 8 4. Product description 9 4.1 Services: 10 4.2 Product selection: 10 4.3 Price & determination: 11 4.4 Competitive edge: 11 5. Organization Plan 12 6. Marketing Plan 15 6.1 Market Research 15 6.2 Market Segmentation 15 6.3 Target Market Segment Strategy 15 6.4 Competitive Strategy 16 6.5 Promotion Strategy 16 6.5.1 Publicity: 16 6.5.2 Advertisement 17 6.5.3 Internet and Social media 17 7. Financial Plan 18 7.1 Cost of the product 18 7.2 Advertisement cost 19 7.3 Salary 20 Conclusion 22 Reference: 23 1.Executive summary: University students and staff averagely spend their most valuable time nearly 45 minutes in a day to mark attendance, borrow a book from the library, or to take a token for dining. In many instances time is more valuable than anything on this living planet. Here comes to play we had a different view on this and we come up with a new technology, NFC. Near field communications (NFC) are a technology that......

Words: 4063 - Pages: 17

Premium Essay

Nfc in Universities

...study in universities “Enabling NFC in Universities” (NFC enabled Student Identification card for University students) Contents 1.Executive summary: 4 2. Description of the project 6 2.1 The projects intended location 6 2.2 The environment surrounding it 6 2.3 Availability of the resources required to start the business 6 2.4 Business goals and objectives 7 2.5 History of the project 7 2.6 Motivation to start business 7 3. Market Description 8 3.1 Target market 8 3.2 Entering the market 8 4. Product description 9 4.1 Services: 10 4.2 Product selection: 10 4.3 Price & determination: 11 4.4 Competitive edge: 11 5. Organization Plan 12 6. Marketing Plan 15 6.1 Market Research 15 6.2 Market Segmentation 15 6.3 Target Market Segment Strategy 15 6.4 Competitive Strategy 16 6.5 Promotion Strategy 16 6.5.1 Publicity: 16 6.5.2 Advertisement 17 6.5.3 Internet and Social media 17 7. Financial Plan 18 7.1 Cost of the product 18 7.2 Advertisement cost 19 7.3 Salary 20 Conclusion 22 Reference: 23 1.Executive summary: University students and staff averagely spend their most valuable time nearly 45 minutes in a day to mark attendance, borrow a book from the library, or to take a token for dining. In many instances time is more valuable than anything on this living planet. Here comes to play we had a different view on this and we come up with a new technology, NFC. Near field communications (NFC) are a technology that......

Words: 4063 - Pages: 17

Premium Essay

Nfc Executive Summary

...view on this and we come up with a new technology, NFC. Near field communications (NFC) are a technology that authorizes communications in between student ID cards and NFC devices or smart phones and NFC devices. This technology reduces the student or staff interaction time with library books issuing, payments, dining and attendance. The communications between them, is completely secure and takes place in short ranges. Student ID cards and smartphones are equipped with NFC chip, which communicates with device. Smart phones hoist rate is elevating day to day, according to UN poll survey 5 out of 7 students use smartphone at university level. Applications for Android, IOS and windows stores are vividly developing to support the NFC. Initially NFC technology is introduced in certain services, within a year they are completely introduced into almost every possible service. This limitation is to reduce the emphasizing effect, generally when new technology change is performed. Enabling NFC in universities will offer tremendous advanced technology to serve the university students. NFC developments are of interest to students and university staff because of insights that offer by providing this technology is abundant. Existing services relying on NFC technology concentrate in very few service areas. Regardless of other service providers, we are focusing to introduce the technology in every possible aspect. Economically facilitating NFC technology can be considered low, due to......

Words: 373 - Pages: 2

Free Essay

Hpv Proposal

...Cover Letter Women Empowering Women Health Center Po Box 7234 Lexington, SC 29073 December 6, 2011 Arnold School of Public Health Department of Health Promotion, Education, and Behavior Columbia, SC 29210 re: HPV & Cervical Cancer: A Health Promotion Plan to Promote Awareness and Prevention of HPV & Cervical Cancer Dear Dr. Brandt: I am writing to request funding for a program that is designed to bring awareness and prevention to Human Papillomavirus (HPV), which causes virtually all cases of cervical cancer and genital warts, while encouraging a healthier lifestyle among young minority girls ages 10-18 in the state of South Carolina. Many young girls are at risk of getting the HPV virus due to lack of education and awareness about the virus. The program that we are launching is relatively simple. WEWHC is a non-profit organization that prides itself on educating the public about sexually transmitted infections/diseases. We are dedicated to empowering the public and proving them with the necessary tools and resources to make sound and educated judgments. Our staff is compiled of volunteers to include nurses, social workers, administrative assistants, health care physicians, and psychologists. Our motto is, “It takes a village.” With this concept in mind, the staff at WEWHC knows and understands the importance of having more than one person involved in helping the community. After one year the program will be evaluated by an independent source to......

Words: 1015 - Pages: 5