Mobile Trusted Computing

Total Page:16

File Type:pdf, Size:1020Kb

Mobile Trusted Computing Mobile Trusted Computing Fruct 2011 7.11 2011 Jan-Erik Ekberg Partly joint work with N.Asokan, K Kostiainen, E Reshtova Platform Security applications • To achieve secure processing in heterogenous environments, trust roots are needed • Without enforcement, guarantees are hard to give • A good security infrastructure leaves room for Open OS with un-trusted components without sacrificing OS MAC overall security • Compared to perimeter security, the trusted computing base is minimized Secure execution • Software vulnerability analysis is still an environment for integral part of the system, but not at run-time, credentials security is achieved by “updates only”. • Privacy needs to be also guaranteed by policy, not just by mechanism. This is common-place, e.g. in HW support communication networks. - integrity - secure storage - secure processing - isolated memories? 4 © 2010 Nokia ETISS 2010.ppt / J-EE Enforcement mechanisms have a history • Hardware-support for platform security −Cambridge CAP etc. (~1970s) / Multics Extended to Trusted Execution Environments HW • Hardware-assisted secure storage • Secure and authenticated boot −TCPA and TCG (late 1990s) HW +OS −Academic research projects (mid 1990s) Extended (private secure storage for applications) Adapted (normal vs. developer mode in MSSF) • Permission-based platform security architectures −VAX /VMS privileges for user (~1970s) OS Adapted for applications −Code signing (mid 1990s) Borrowed for application installation 5 © 2010 Nokia ETISS 2010.ppt / J-EE HW Enablers / ASIC support (high-level view) Hardware support for platform security Public key E.g., serial hash number Trust root Base identity Crypto Library Start of boot code Boot sequence (ROM) Basic elements in TCB for platform software immutable storage 7 Nokia Research Center 2011 Secure bootstrapping Code certificate Boot code hash Validate and Trust root execute Crypto Library Boot sequence Secure boot (ROM) Ensure only authorized boot TCB for platform software image can be loaded Launch platform boot code 8 Nokia Research Center 2011 Identity binding Identity certificate Code certificate Base identity Boot code hash Assigned identity E.g., IMEI, link-layer addresses, … Trust root Base identity Validate and accept Crypto Library assigned ID Boot sequence (ROM) Secure boot Securely assign different TCB for platform software identities to the device Launch platform boot code 9 Nokia Research Center 2011 Trusted execution Identity certificate Code certificate Boot code hash Base identity Validate and execute Assigned identity Code certificate TrEE code hash Isolated execution Trust root Base identity TrEE Basis for secure Crypto Library Device key external storage Boot sequence TrEE code Secure boot (ROM) TCB for platform software Launch platform boot code TrEE API 10 Nokia Research Center 2011 Authorized code execution, isolated from the OS Secure state Identity certificate Code certificate Base identity Boot code hash Assigned identity Code certificate Securing TrEE sessions, TrEE code hash authenticated boot Trust root Base identity Configuration TrEE register(s) Crypto Library Device key Non-vol. memory TrEE code or Boot sequence counter Secure boot (ROM) TCB for platform software Rollback protection for persistent secure storage Launch platform boot code TrEE API 11 Nokia Research Center 2011 Integrity-protected state within the TrEE Device authentication, secure provisioning, Device authentication attestation External trust root Identity certificate Code certificate Boot code hash Base identity Device certificate Assigned identity Code certificate Identity TrEE code hash Public device key Trust root Base identity Configuration TrEE register(s) Crypto Library Device key Non-vol. memory TrEE code or Boot sequence counter Secure boot (ROM) TCB for platform software Launch platform boot code TrEE API 12 Nokia Research Center 2011 Prove device identity or properties to external verifier Summary of hardware mechanisms • Secure boot: Ensure only authorized boot image can be loaded • Authenticated boot: Measure and remember loaded image • Identity binding: Securely assign identities to the device • Secure storage: Protect confidentiality and integrity of data • Isolated execution: Run authorized code isolated from OS • Device authentication: Prove device identity to external verifier • Remote attestation: Prove device configuration to verifier 13 Nokia Research Center 2011 Hardware security architectures (mobile) • TI M-Shield and ARM TrustZone • Augments central processing unit −“Secure processor mode” • Isolated execution with on-chip RAM −Very limited (<10kB) • Secure storage −Typically with write-once E-fuses • Usually no counters or non-volatile memory −Cost issue 14 Nokia Research Center 2011 Hardware security architectures (TCG) • Trusted Platform Module (TPM) −Standalone processor on PCs −Isolated execution for pre-defined algorithms −Arbitrary isolated execution with DRTM −Platform Configuration Registers (PCRs) −Monotonic counters • Mobile Trusted Module (MTM) −Mobile variant of TPM −Can be implemented using e.g. TrustZone or M-Shield −Discussed further… 15 Nokia Research Center 2011 Uses of hardware security • Recap from features −Secure/authenticated boot −Identity binding/device authentication −Secure storage −Remote attestation • Uses of hardware security (device manufacturer) −Device initialization −DRM −Subsidy lock • How can developers make use of hardware security? 16 Nokia Research Center 2011 SW/OS support Adoption of security mechanisms Operators Regulators End users ~2002 Hardware-based mechanisms ~2001 ~2005 ~2008 ~2010 ~2011 18 Nokia Research Center 2011 Software-based mechanisms Open mobile platforms • Java ME ~2001 • Android ~2007 −For “feature phones” −Linux-based OS −3 billion devices! −App development in Java −Not any more supported by the latest smartphones • MeeGo ~2010 −Linux-based OS • Symbian ~2004 −App development in C (Qt) −First “smartphone” OS −MSSF −App development in C++ (Qt) • Windows Phone ~2010 −Windows (CE) based kernel − End-user app development in Silverlight / .NET 19 Nokia Research Center 2011 Mobile platform security model • 3.5 phases 1. Distribution 2. Installation 3. Run-time enforcement 4. ++ off-line enforcement • Common techniques −Code signing −Permission-based access control architecture − (User involvement in assigning permissions) − App R&D by local “installation” / “opened device” 20 Nokia Research Center 2011 Distribution Software package • Developer produces a software package −Code −Manifest • May submit to a signer for a Developer trusted signature Signed • Distributed to device via on-line software stores (typically) package Software package 21 Nokia Research Center 2011 Installation Software Signed software package package • Installer consults local policy and trusted signature − Identify application − Grant requested privileges • Installer may prompt user Installer Policy 22 Nokia Research Center 2011 Run-time enforcement • Monitor checks if subject has privileges for requested access Monitor resource • Resource may perform principal additional checks • User may be prompted to authorize access 23 Nokia Research Center 2011 1. OS bootstrapping Is hardware security used to secure OS bootstrapping? Symbian Java ME Android MSSF Windows Phone Secure Not No? Authenticated boot: “Normal No? boot applicable mode” vs “Developer mode” 24 Nokia Research Center 2011 2. Application identification How are applications identified at install and runtime? Symbian Java ME Android MSSF Windows Phone Install and run- Install: Install: Install: Install: time: • Signing key • Signing key • Software • Software • Protected • Midlet source source range SID and attributes Runtime: (signing key) VID • Unix UID • Package No IPC between (managed) • Package name installed • UID name (locally applications (unmanaged) unique) Runtime: • Software source • Package name 25 Nokia Research Center 2011 • Application ID 3. Application update How is a new version of an existing application verified? Symbian Java ME Android MSSF Protected SID, VID: Signed midlets: “Same origin” policy “Same or higher • trusted signature • same-origin policy origin” policy Rest: Unsigned midlets: • no controls • user prompt 26 Nokia Research Center 2011 4. Permission granularity How finely is access control defined? Symbian Java ME Android MSSF Windows Phone Fixed set of Fine-grained Fine-grained Fine-grained Fixed set “capabilities” permissions permissions resource-tokens of capabilities (21) (many) (112) (8++) Linux access Four Linux access control “chambers” control Android and MSSF: Each application is installed under a separate Linux UID 27 Nokia Research Center 2011 5. Permission assignment (basis) Least Privilege Chamber Standard Rights Basis for granting permissions? Elevated Rights Trusted Computing Base Symbian Java ME Android MSSF Windows Phone 4 categories Trusted 4 Trusted signatures Chambers map signatures for protection to stakeholders Trusted protection levels Local policy file (MS / OEM / signature (also domains operator / user) user prompts) 4 permission Capabilities defined modes by developer (least- privilege prot.) User Blanket, System, Session, Normal (automatic) Restricted, One-shot, Dangerous (user-granted) Manufacturer No Signature (developer-controlled) 28 Nokia Research Center 2011 SystemOrSignature (Google-controlled) 6. Permission assignment (user prompting) Symbian Java ME Android Windows Phone Capability Function group Permission group Capability description description
Recommended publications
  • Real-Time Monitoring of a Mobile Ticketing Solution
    Journal of Traffic and Logistics Engineering Vol. 7, No. 2, December 2019 Real-Time Monitoring of a Mobile Ticketing Solution Marta Campos Ferreira, Teresa Galvão Dias, and João Falcão e Cunha Universidade do Porto – Faculdade de Engenharia, Porto, Portugal Email: {mferreira, tgalvao, jfcunha}@fe.up.pt Abstract—Mobile ticketing in public transportation is problems for the customers that fully utilize the mobile starting to replace the old ticket card. As technology evolves, ticketing solution. It also provides a fast and steady there is the need to reduce the complexity of existing public approach to facilitate flaw and error handling. transportation systems. Usually, it is required that users The paper organized as follows: the next section memorize different areas of the city, know the exchanging presents the related work concerning monitoring systems points and the complete schedule for a specific transportation vehicle. This context, together with the fact and the main approaches to mobile ticketing solutions. that technology is rising as fast as ever and that the users are Section 3 describes current fare system of the increasingly accepting mobile payment solutions, motivated Metropolitan Area of Porto. Section 4 presents the future the development of a new solution for mobile ticketing. This mobile ticketing solution, Anda, which is the system solution is based on existing technologies, such as Near Field being monitored in the present paper. Section 5 expands Communication and Bluetooth Low Energy beacons on the monitoring system, explaining in detail the through a Check-In/Be-Out system and one of its main proposed approach, technologies and main goals of the objectives is to eliminate the need for users to understand monitoring.
    [Show full text]
  • Exploring Mobile Ticketing in Public Transport an Analysis of Enablers for Successful Adoption in the Netherlands
    Exploring Mobile Ticketing in Public Transport An analysis of enablers for successful adoption in The Netherlands April 2017 Expertise Centre for E-ticketing in Public Transport S.K. Cheng Faculty of Faculty Industrial Design Engineering Exploring Mobile Ticketing in Public Transport An analysis of enablers for successful adoption in The Netherlands Analysis report April 2017 Delft University of Technology This report is part of the Expertise Centre for E-ticketing in Public Transport (X-CEPT). March 2017 (version 1.0) Author S.K. Cheng Project coordination Dr.ir. J.I. van Kuijk [email protected] Project execution S.K. Cheng Academic supervisors Dr.ir. G.J. Pasman Dr.ir. J.I. van Kuijk Translink supervisor M. Yntema Project partners GVB I. Keur NS P. Witmer RET J.P. Duurland List of definitions App. An abbreviation for application: a computer program or piece of software designed for a particular purpose that you can download onto a mobile phone or other mobile devices. Fare media. The collection of objects that travellers carry to show that a fare or admission fee has been paid. Paper tickets and the OV-chipkaart are fare media for example. Interaction. Bi-directional information exchange between users and equipment (ISO, 2013). User input and machine response together form an interaction. Journey & Trip. A journey refers to travelling from A to B, while a trip refers to a segment of the journey. A journey can consist of multiple trips. For example, when going from train station Delft to Beurs metro station in Rotterdam, the journey is from Delft to Beurs.
    [Show full text]
  • Gartner Analyst Relations Forum
    Why Enterprise AR Should Care About Consumer IT Martin Reynolds, GTM Gartner Consumer Research 1 We are entering a new era of personal computing. The cloud will replace the PC as the location where users keep their personal content, access their services, and personal preferences and center their digital lives. It will be the glue that connects the web of connected devices they choose to use during the different aspects of their daily life. Technology providers and IT organizations must align to this new reality of consumerization. Our Consumer Research Team • 40 analysts around the globe • Covers devices, services and consumer dynamics • Works across Gartner teams • Resegmenting forecasts to common definitions • Using economic and behavioral models • Integrating social content through the research 3 How Our Consumer Research Can Help AR to Help the Business Grow • Strategy • Product development • Marketing • Market & Competitive Intelligence Key Insights for Enterprise-only Providers: - All applications must face consumers - All tools must be “sticky” - Security must be positive, not negative - Behavior and needs, not features and speeds 4 Consumer Dynamics Market Segments and Buyer Behavior Consumer Infotainment Spending Will Grow Past $2.2 Trillion in 2014 Forces Content Megatrends 10% $200 Billion • A boost will come from CAGR 2010-2015 = 9% Mobile Services 35% mobile subscribers in $700 Billion CAGR 2010-2015 = 5% emerging markets. • Broadband will be Devices 28% available everywhere. $600 Billion Total Services CAGR 2010-2015 = 6%
    [Show full text]
  • Background and Purpose
    ATTACHMENT A Scope of Work RFP No. VRE-020-015 Page 1 VRE Mobile Ticketing System Virginia Railway Express SCOPE OF WORK _______________________________________________________________ 01. TICKET INFORMATION A. The existing VRE fare policy is structured on a distance-based zone system. There are nine (9) fare zones on the Fredericksburg line (with no stations currently in zone 7) and six (6) fare zones on the Manassas line. B. The validation policy for each ticket type made available on the mobile application is as follows: 1. Single-Ride, Day Pass, and Ten-Ride tickets must be validated before boarding trains. 2. 7-Day and 31-Day Passes must be validated at the time of first use. 3. Note: Calendar monthly tickets are currently not available on VRE Mobile. C. VRE’s fare structure is available at https://www.vre.org/service/fares/. D. VRE has a cross-honor agreement with Amtrak that allows the Amtrak Step-Up ticket to be used in conjunction with a multi-ride VRE ticket. Additional information on the Amtrak Step-Up Ticket can be found in Section 07 below and also at https://www.vre.org/service/fares/stepup/. E. VRE also offers 50% discounted tickets termed Reduced Fare Tickets for persons with disabilities, senior citizens and youths between the ages of 11 and 18. Additional information on the eligibility requirements for discounted tickets is found at https://www.vre.org/service/fares/reduced-fare-chart/. F. At the time of writing of this Scope of Work, VRE Mobile has monthly total sales averaging $1,000,000 and a monthly average of 20,000 tickets sold by the current moovel mobile ticketing system.
    [Show full text]
  • Embedded Systems and Computer Security
    Master Embedded Systems and Computer Security ISAE Rodolphe Ortalo RSSI - CARSAT Midi-Pyrénées [email protected] ([email protected] ) http://rodolphe.ortalo.free.fr/ssi.html Overall presentation (1/2) ● Fast paced computer security walkthrough ● Security properties ● Attacks categories ● Elements of cryptography ● Introduction to mandatory security policies ● Embedded systems and security ● Specificities ● Physical attacks (SPA, DPA) ● TPM ● Software development and security ● Security requirements and process ● Static verification and software development tools ● Common criteria / ISO 15408 ISAE – Embedded systems MS – 2012/2013 2 Overall presentation (2/2) ● Case studies ● Wireless networks ● New generation avionics systems ● Network appliances ● Mobile telephony ● Gaming devices ● Wrap-up (if time permits) ● IDS ● Firewalls ● Tripwire ● Metasploit ● Anti-virus ISAE – Embedded systems MS – 2012/2013 3 Overall presentation (1/2) ● Fast paced computer security walkthrough ● Security properties ● Attacks categories ● Elements of cryptography ● Introduction to mandatory security policies ● Embedded systems and security ● Specificities ● Physical attacks (SPA, DPA) ● TPM ● Software development and security ● Security requirements and process ● Static verification and software development tools ● Common criteria / ISO 15408 ISAE – Embedded systems MS – 2012/2013 4 A wide perimeter ● Non-technical activities ● Threats awareness ● Agents habilitation ● Attacks ● Written delegation ● Vulnerabilities / Audit ● Contracts ● Intrusion
    [Show full text]
  • The Mobile Commerce Prospects: Corresponding Sections of the Society
    MOB_Schutzumschlag.FH11 Mon May 21 11:39:27 2007 Seite 1 C M Y CM MY CY CMY K Mobile Commerce has gained increasing acceptance amongst various sections of the society in previous years. The reasons for its growth can be traced back to technological and demographical developments that have influenced many aspects of the socio- cultural behaviour in todays world. The need (and/or wish) for Rajnish Tiwari mobility seems to be the driving force behind Mobile Commerce. The launch of UMTS technology has provided Mobile Commerce Stephan Buse with the necessary verve. Mobile Banking presents an opportunity for banks to retain their existing, technology-savvy customer base by offering value- added, innovative services and to attract new customers from The Mobile Commerce Prospects: corresponding sections of the society. The customer survey provides evidence that such sections in the meanwhile include the affluent and financially relevant groups of the society in Germany. The time seems to be ripe to convert this non-negligible A Strategic Analysis of Opportunities customer interest into business-driving customer demand. A proactive attitude on the part of the banks seems to be therefore in the Banking Sector recommendable. Many banks in Germany have come to regard Mobile Banking as a necessary tool for thwarting negative differentiation vis-à- vis rivals and to foster/retain an innovative image. This self- reinforcing dynamism is expected to gain currency in near-future so that Mobile Banking services could soon advance to a standard product on the lines of Online Banking offered by more or less each and every bank.
    [Show full text]
  • Connect. Grow. Inspire. Technology Fast500™ Asia Pacific 2011 Winners Report and Ranking
    Connect. Grow. Inspire. Technology Fast500™ Asia Pacific 2011 Winners Report and Ranking Contents Foreword Foreword 1 This is the tenth year of the Deloitte Touche Tohmatsu Limited (DTTL) grocery and basic household-items franchise of choice for China’s Global Technology, Media & Telecommunications (TMT) Industry newly net-savvy consumers. The Store Corporation realized a DTTL TMT at a glance 2 Group’s annual Technology Fast 500 Asia Pacific Ranking. We’ve seen remarkable 19,218 percent three-year revenue growth, almost in Asia Pacific’s most dynamic and highest-growth companies power a league of its own when compared to this year’s second highest Fast facts file 4 through the global financial crisis, with the leaders actually increasing performer, South Korean semiconductor company Silicon Mitus, their revenue growth rate, despite the world’s economic woes and which managed just under 9,336 percent. In these pages, The Store China’s greatest growth story: Interview with Gang Yu, CEO of The Store Corporation 8 the contraction in the region’s traditional Western export markets. Corporation chairman and co-founder Gang Yu talks about the That is a truly impressive achievement and we’re proud that the company’s core competencies and the values that have taken it from Masters of their game: The top five companies 10 Technology Fast 500 Asia Pacific Ranking remains a benchmark of its initial base in China’s major metropolitan regions to cover the whole their performance. country. We also talk to Yang Berbahagia Datuk Azrin Mohd Noor, Deloitte
    [Show full text]
  • Mobile Value Added Services (MVAS) - a Vehicle to Usher in Inclusive Growth and Bridge the Digital Divide
    Mobile Value Added Services (MVAS) - A vehicle to usher in inclusive growth and bridge the digital divide January 2011 www.deloitte.com/in 2 Contents Message from Chairman, TRAI 4 Message from President, ASSOCHAM 5 Message from Secretary General, ASSOCHAM 6 Message from Deloitte 7 Objective & Methodology 8 Executive Summary 9 Introduction 12 What is MVAS? 15 What is Utility MVAS? 18 Key categories in Utility MVAS 18 A Framework for Utility MVAS 20 Drivers for Utility MVAS 21 Categories in focus 26 Category 1 : M-Commerce 27 Category 2 : M-Education 33 Category 3 : M-Health 40 Category 4 : M-Governance 46 Current state of Utility MVAS in India 51 Utility MVAS: Challenges 54 Utility MVAS: Potential solutions 56 Utility MVAS: Suggested implementation approach 62 Acknowledgements 64 Notes 65 Authors 68 Mobile Value Added Services (MVAS) - A vehicle to usher in inclusive growth and bridge the digital divide 3 Message from Chairman, TRAI I would like to compliment the ASSOCHAM for bringing providers in generating new revenue streams as also out a Study Report on Mobile Value Added Services the consumers in receiving the benefits of personalised – A Vehicle to Usher in Inclusive Growth and Bridge applications. the Digital Divide in India. I am sure that the analysis and inputs given by the Mobile Value Added Services (MVAS) have assumed ASSOCHAM in the Study Report will be useful in framing significant importance in recent times due to the rapid suitable policies with regard to MVAS. growth in wireless subscriber base. They have enhanced the utility of mobile phone as a powerful medium to deliver information viz., News, Entertainment, Advertisement, Music, Games, Commerce, Education and Health.
    [Show full text]
  • Assessment of Mobile Fare Payment Technology for Future Deployment in Florida
    ASSESSMENT OF MOBILE FARE PAYMENT TECHNOLOGY FOR FUTURE DEPLOYMENT IN FLORIDA ASSESSMENT OF MOBILE FARE PAYMENT TECHNOLOGY FOR FUTURE DEPLOYMENT IN FLORIDA FDOT BDV 943-39 DRAFT Final Report Prepared for Florida Department of Transportation Project Manager: Diane Quigley Transit Planning Administrator 605 Suwannee Street, MS 26 Tallahassee, FL 32399 (850)414-4520 [email protected] Prepared by Center for Urban Transportation Research Principal Investigator: Nevine Labib Georggi Senior Research Associate University of South Florida 4202 E. Fowler Avenue, CUT100 Tampa, FL 33620-5375 [email protected] 813-974-9770 March 2016 Disclaimer The opinions, findings, and conclusions expressed in this publication are those of the author(s) and not necessarily those of the Florida Department of Transportation or the U.S. Department of Transportation. The authors do not endorse products from any vendors. Products illustrated in the report are used as examples of available technology. i Acknowledgements The study team: Project Manager: Diane Quigley, Transit Planning Administrator, FDOT Principal Investigator: Nevine Labib Georggi, Senior Research Associate, CUTR Co-Principal Investigator: Dr. Sean Barbeau, Principal Mobile Software Architect for R&D, CUTR Researcher: Ann Joslin, Senior Research Associate, CUTR, and Consultant: Dr. Candace Brakewood, Assistant Professor, Department of Civil Engineering, City College of New York ii Executive Summary The Florida Department of Transportation (FDOT) is conducting a two-part research study to evaluate the efficacy of deploying a mobile phone fare payment system at a transit agency in Florida. FDOT selected StarMetro as the pilot agency. This final report describes tasks conducted for Phase I of the study.
    [Show full text]
  • Venyon Presentation Mobey Helsinki 20100618 FINAL
    TSM perspective on future of mobile payments Mobey Forum Lauri Pesonen June 18, 2010, Helsinki CEO, Venyon Topics for the presentation Enablers and drivers for Mobile Financial Services Role of TSM in the Mobile Payment Ecosystem Where are we now, future outlook Questions & Answers Mobey Forum 18.6.2010 Page 2 Consumers carry multiple credential for their daily services Mobey Forum 18.6.2010 Page 3 Mobile phone consolidates consumer’s credentials as the ultimate device to use and conduct services Mobile Financial Services are an essential part of this evolution Pay Communicate Identify Mobey Forum 18.6.2010 Page 4 Common mobile enablers supporting Mobile Financial Services Common mobile enablers Mobile subscriber penetration Consumer acceptance of new services Stickiness, mobile phone always with you Advances in mobile technologies IP convergence … supporting mobile financial services Payments at point-of-sale Online payments Person-to-person, money transfer Account management, bill payments Mobey Forum 18.6.2010 Page 5 Advances in mobile technologies cater for implementation of compelling Mobile Payment services Online Application Life-Cycle Management Wallet Mobile Multiple Branding IP channel Applications Network Bandwidth Rich Application Environment SMS channel Online Services Secure Element Multi-application Smart Card chip: - Secure storage and ISO 14443 NFC processing of credentials - Compatibility with existing infrastructure Proximity Services Mobey Forum 18.6.2010 Page 6 Mobile Payments is new playing field for
    [Show full text]
  • Multi-Company Report
    February 22, 2016 Equity Research MWC Trade Show: Smartphones, IoT, Automotive Today (2/22/2015) at the Mobile World Congress (MWC) in Barcelona, Spain we were interested to see various chip companies like Qualcomm, Intel, MediaTek and Infineon highlighted chip technology for smartphones, drones, wearables, virtual reality and automotive applications. Qualcomm announced its 820 Semiconductors processor will be used in Samsung’s Galaxy S7 series phones in some regions. We think that Samsung’s decision to use the Snapdragon 820 processor in its flagship Galaxy S7 family of smartphones suggests that Qualcomm has fixed the issues with the prior generation Snapdragon 810 family of chips that impacted Qualcomm competitively in 2015. We are reiterating our Outperform rating on Qualcomm (QCOM, $51.28). Qualcomm announced the latest Samsung Galaxy S7 and S7 Edge for select regions will be powered by Qualcomm’s Snapdragon 820 processor with the integrated Snapdragon X12 LTE (long term evolution) modem. In addition the new LG G5 smartphone, HP Elite X3 and Sony Xperia X Performance will be based on Qualcomm’s latest Snapdragon 820 chipset. Intel’s booth emphasized wireless and 5G demonstrations, along with network and cloud demonstrations using NFV (network functions virtualization). Intel also had examples of connected devices using its solutions including smart eyewear, wireless charging and an Intel Curie based wearable payment device. We think that Intel’s early investments in 5G, its efforts to build its 4G LTE cellular modem position, its portfolio of other shorter range wireless capabilities and its expertise in processors will help Intel establish itself as an important chip provider in the IoT (internet of things) space in the future.
    [Show full text]
  • Kapsch Group Annual Report 2017/18 Kapsch Group
    EN Kapsch Group The future is now. Annual Report 2017/18. Overview. Fiscal Year 2017/18. Highlights of the Fiscal Year from April 1, 2017 to March 31, 2018. Kapsch Group. Commercial success. The revenue record set in the prior year was broken again, reaching a new high of EUR 1,145 million in the 2017/18 fiscal year. Innovation power. Kapsch Group increased investments in research and development by 11% from EUR 125.0 million to EUR 138.8 million. Kapsch TrafficCom. Major deals won. In Bulgaria, Kapsch TrafficCom secured the contract for constructing, technically equip- ping and technically supporting the nationwide tolling system for trucks over 3.5 metric tons as well as for launching the electronic toll sticker for cars. A joint venture between Kapsch TrafficCom and the Zambian company Lamise Trading Limited received a nationwide concession from the Zambian government to improve road safety and traffic management. tolltickets certified as an EETS provider. The European Electronic Toll Service (EETS) supplements the national electronic tolling systems of the member states and simplifies cross-border mobility for road users due to the fact that a vehicle operating internationally no longer needs to be equipped with a separate on-board unit (OBU) for every country. Kapsch PublicTransportCom. Mobile ticketing. In 2017/18, Kapsch PublicTransportCom fully concentrated on implementing its numer- ous customer projects in Belgium, the Netherlands, Romania, the USA, and Africa. The mobile ticketing solution for the Metropolitan Atlanta Rapid Transit Authority (MARTA) is worth highlighting. It enables passengers to order, purchase, and validate their tickets via a mobile app or on a mobile website.
    [Show full text]