SlideShare a Scribd company logo
What is a Trusted Service Manager?
A Trusted Service Manager (TSM)
plays a vital role in the Near Field
Communication (NFC) ecosystem.
A TSM acts as a trusted middle-
man within the deployment of
mobile payments:
1. Coordinating technical and business
relationships of multiple stakeholers:
mobile network operators (MNO), banks
and other service providers (SP).
2. Securely installing and personalizing
applications on the Secure Element (SE).
3. Handling banking and mobile
security and securing consumer
information.
4. Performing lifecycle management
tasks for installed applications.
5. Securely generating,
managing and
distributing
cryptographic
keys
TSM models
An SP communicates with an MNO to
add an application on an NFC device.
But the reality is more complex.
Utopian NFC ecosystem with one TSM.
Different organisation see themselves
as TSM and no single organisation is
trusted by everyone.
One TSM creates ownership issues
regarding relationships and data.
Current NFC ecosystem:
Root TSM and SP TSM model
A Root TSM
- manages the Root Security Domain (SD) on
the NFC device and its keys.
- informs SP TSMs of key events on applications.
- interacts with the phone.
- interacts with service provider TSMs.
An SP TSM
- provisions, manages, loads and personalises
applications into the SD on behalf of SPs.
- manages their own secure environment.
- interacts with the phone to install and
personalise services.
- interacts with Root TSMs to communicate
state changes of applications.
Why TSM?
1. Multiple markets becoming
part of the mobile ecosystem are
required to collaborate.
2. TSMs are their Single Point of
Contact.
3. Markets such as payments,
transit and access control need
to cooperate.
4. TSMs allow stakeholders to
effectively communicate and
handle transactions securely
with each other.
Becoming a TSM?
Service providers can keep
control of their customers by
becoming their own TSM.
This ensures flexibility and scalability
to meet future market demands.
SE
Interested in becoming a TSM?
Watch our video:
With over 20 years of expertise, Bell ID is considered the world’s leading provider of
lifecycle management solutions for tokens (e.g. smart cards, mobile NFC phones)
deployed in single and multi-application programmes.
www.bellid.com
David Worthington
Principle Consultant Payment
& Chip Technology
d. worthington@bellid.com

More Related Content

PPTX
CNCF Keynote - What is cloud native?
PPTX
Cinema management system
PPT
7 Examples of good and bad e-commerce websites
PPT
API Strategy Presentation
PDF
Actividad No. 6.3: Escaneo de vulnerabilidades con Nessus
PPTX
Digital evidence
PDF
Serverless computing with AWS Lambda
PPTX
Mule Concur Connector
CNCF Keynote - What is cloud native?
Cinema management system
7 Examples of good and bad e-commerce websites
API Strategy Presentation
Actividad No. 6.3: Escaneo de vulnerabilidades con Nessus
Digital evidence
Serverless computing with AWS Lambda
Mule Concur Connector

What's hot (20)

PDF
APIConnect Security Best Practice
PPTX
Windows Azure Service Bus
PDF
SDN 101
PPTX
Azure Service Bus
PDF
Best Practices for API Management
PPTX
Mendix Accelerates the Software Lifecycle
DOCX
A project on taxi
PPTX
SQX Solution Day 2013 Q2 - Milestone Update
PDF
Azure AD B2C – integration in a bank
PDF
Extending WSO2 API Manager's Key Management Capabilities - WSO2 API Manager C...
DOCX
Ambrish keshari resume
PPT
Ec2009 ch14 creating and launching
PPT
Mobile forensics
PPTX
Detecting Malicious Social Bots Based-3.pptx
PPTX
Active directory domain service
PPTX
Ports and protocols
PPTX
Mobile Forensics
PPTX
Introduction of cryptography and network security
PDF
Akamai 2016 Investor Relations Summit Presentation
PPT
Cyber cafe
APIConnect Security Best Practice
Windows Azure Service Bus
SDN 101
Azure Service Bus
Best Practices for API Management
Mendix Accelerates the Software Lifecycle
A project on taxi
SQX Solution Day 2013 Q2 - Milestone Update
Azure AD B2C – integration in a bank
Extending WSO2 API Manager's Key Management Capabilities - WSO2 API Manager C...
Ambrish keshari resume
Ec2009 ch14 creating and launching
Mobile forensics
Detecting Malicious Social Bots Based-3.pptx
Active directory domain service
Ports and protocols
Mobile Forensics
Introduction of cryptography and network security
Akamai 2016 Investor Relations Summit Presentation
Cyber cafe
Ad

Viewers also liked (20)

PPTX
Near Field Communication (NFC)
PDF
NFC Industry Update
PPTX
NEAR FIELD COMMUNICATION (NFC)
PPTX
Nfc technology
PPTX
Near field commmunication
PPTX
Near field communication ppt
PDF
Near field communication & Branding
PPT
Near field communication - Data transmission
PPTX
Nfc presentation
PDF
NFC in direct mail: The pros and cons
PPTX
Near Field Communication by Mohammed Mudassir
PPTX
Near field communication
PPTX
Near field communication
PPTX
SIM application toolkit in the context of Near Field communication Applications
PPTX
near field communication
PPT
e-wallet , The future of Cards and Money
PPTX
PPTX
PPTX
PPT
Near field communication
Near Field Communication (NFC)
NFC Industry Update
NEAR FIELD COMMUNICATION (NFC)
Nfc technology
Near field commmunication
Near field communication ppt
Near field communication & Branding
Near field communication - Data transmission
Nfc presentation
NFC in direct mail: The pros and cons
Near Field Communication by Mohammed Mudassir
Near field communication
Near field communication
SIM application toolkit in the context of Near Field communication Applications
near field communication
e-wallet , The future of Cards and Money
Near field communication
Ad

Similar to What is a Trusted Service Manager? (20)

PPTX
Mobile Convention Amsterdam 2014 - UL - Amos Kater
PPTX
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLD
PDF
What is a Token Service Provider?
PPTX
M baa s as the new enterprise middleware
PDF
6 Considerations When Launching NFC Services
PDF
Trusted Service Manager – Role and Challenges
PDF
TM Forum Webinar - Telco API-driven digital marketplace opportunities | Post-...
PPT
Building Enterprise Ready Mobile Apps: A Developer Deep Dive
PDF
Ims10 ims mobile - IMS UG May 2014 Sydney & Melbourne
PDF
Ngen oss bss - architecture evolution
PPTX
Mobile Payment Forecast: mostly cloudy with intermittent NCF. How mobile and...
PDF
Role of Service Delivery Platforms in Financial Industry
PDF
Maximizing your vas services with mobile marketing
PPS
PPT
Future of Mobile Workshop
PDF
Платформа создания инновационных услуг для телекоммуникационного оператора и ...
PPTX
Mobile meetup
PDF
Bluemix Mobile Cloud Services - Accelerating Mobile App Development
PPT
Uniqueness of mobile - Nokia mLife
PPTX
Blockchain point of view for the telco, media and entertainment industry
Mobile Convention Amsterdam 2014 - UL - Amos Kater
SECURING ONLINE SERVICES IN A MOBILE FIRST WORLD
What is a Token Service Provider?
M baa s as the new enterprise middleware
6 Considerations When Launching NFC Services
Trusted Service Manager – Role and Challenges
TM Forum Webinar - Telco API-driven digital marketplace opportunities | Post-...
Building Enterprise Ready Mobile Apps: A Developer Deep Dive
Ims10 ims mobile - IMS UG May 2014 Sydney & Melbourne
Ngen oss bss - architecture evolution
Mobile Payment Forecast: mostly cloudy with intermittent NCF. How mobile and...
Role of Service Delivery Platforms in Financial Industry
Maximizing your vas services with mobile marketing
Future of Mobile Workshop
Платформа создания инновационных услуг для телекоммуникационного оператора и ...
Mobile meetup
Bluemix Mobile Cloud Services - Accelerating Mobile App Development
Uniqueness of mobile - Nokia mLife
Blockchain point of view for the telco, media and entertainment industry

Recently uploaded (20)

PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Tartificialntelligence_presentation.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Tartificialntelligence_presentation.pptx
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectroscopy.pptx food analysis technology
Programs and apps: productivity, graphics, security and other tools
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
Advanced methodologies resolving dimensionality complications for autism neur...
A comparative analysis of optical character recognition models for extracting...
Reach Out and Touch Someone: Haptics and Empathic Computing
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Getting Started with Data Integration: FME Form 101
MYSQL Presentation for SQL database connectivity
Assigned Numbers - 2025 - Bluetooth® Document
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
NewMind AI Weekly Chronicles - August'25-Week II

What is a Trusted Service Manager?