 There is a huge and growing demand for secure NFC data transfer where data protection is paramount. This includes areas such as contactless payment obviously, access control and public transport ticketing systems. Baris Yilmaz is here to talk about STs offering in this domain. Baris, welcome. Just to start with, why is this of use to me in my home? Well, simply everywhere where our data needs to be protected. This is very useful and if I think about the real example in our home appliance, this could be an electric meter where your consumption of the data must be treated in a confidential way and is your own private data. And why is the ST25 family a perfect fit? Well, the ST25 is a product which can enable us our secure data transfer over NFC thanks to the ST25 TV, which is a dynamic tech and its features where we will focus about the fast transfer mode and the so-called SPSFU. This is a service supported by the STM32 microcontrollers in order to grant a secure boot and an authenticated firmware upgrade. And I can simply use a smartphone? Absolutely, this is simply like this. Today NFC is a contactless technology supported by the Android devices and recently by the iOS 13. So on the technical side of things is where you lose me, but that's important. What are the key benefits to customers? Well, the key benefits is here using the ST25 TV, which enables us to be able to communicate through the contactless interface to an NFC reader or IDR5D reader or smartphone. And at the same time to microcontroller thanks to the I2C interface. And using the fast transfer mode, which is going through RAM memory, we will be able to speed up, which allows us to speed up the communications between those two devices. I'm sorry if it's a stupid question. What's the point in the secure data transfer idea? So we can run a secure data transfer either to send or retrieve data during operation, or if you want to set the parameters of the device directly, or if you want to upload a new firmware to the device. But the key point is that only a granted user will be able to communicate to the STM32 microcontroller in order to perform those operations. And how do you enable the secure transfer channel then? Well, there are three essential elements, let's say, in order to start or establish a secure session. The first one will be mutual authentication, which means that the two operators need to make a handshake first. So there's a first key exchange. The second one will be exchange of the public keys, which is an AS session key, in order to allow the bidirectional encrypted communication and in order to allow to share the private secret. And the third one on top is the crypto algorithms, which is based on the STM32 ready to use firmware implementations in all the microcontrollers. Okay, let's see this in action with your ST25 products. Yes, for sure. And for this purpose, I already prepared a small demo, which consists of the iPhone based on the iOS 13 operating system and the ST25 DV discovery kit based on the STM32 motherboard plus the RFID sister board. So what I'm going to do first is to create a close coupling between those two devices and create a secure session, like I previously explained in the steps before. Once the user is authenticated, we start to read and decrypt or to send the data from the smartphone to the ST25 DV device in a secured way. And for this purpose, I just sent here some measuring data, which can be used for the operation. And I'm going to repeat this same kind of demo again if I create a secure session for the second demo use case and start to send some... An image. An image. Yes, absolutely, to the ST25 device again and as we can follow up on the left screen, the device can decrypt the image. What if somebody's eavesdropping on all of this? Yes, absolutely good point. So for this purpose, I prepared a third one and here the purpose is to show how securely the data transfer can be done. Even there is an eavesdropper in between. So this means if somebody is going to sniff our data and if you repeat the same procedure again and we launch here the function of the eavesdropper and when we send a simple text message from the smartphone to the device again, we can see that the message was properly received by the device. But if we follow up here on the screen what happens if the eavesdropper wants to sniff the data then we can simply see that the data which are encrypted cannot be decrypted by this. It's all corrupted basically. Absolutely. I would not want anyone sniffing my data publish. Absolutely. Listen, thanks so much, it's fantastic and look forward to speaking to you again. Thank you.