siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office.

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office."

Transcription

1 siemens.com/tolling Back-office system Server Supplies all front-end data. Suitable for any GNSS tolling back-office.

2 Server: The universal back-office for efficient and effective toll collection Server can process data from three different satellite systems as well as from microwave-based data collection systems. This ensures precise data recording and toll calculation even for areas with limited signal quality. The so-called front-end of a satellitebased tolling solution comprises a whole range of systems that all have a common objective: collecting and aggregating tollrelated data that will be acceptable as evidence in court, and preparing them for further processing by the billing system of the toll operator. The most visible of these components is the on-board unit (OBU) installed in the vehicle to collect toll-related data. Less obvious, but just as important is the back-office system. Only if this system is equipped with the necessary intelligence to fulfill its many tasks while being open and compatible in all directions, the toll operator can benefit from secure, effective and profitable toll charging processes. Server is up to this crucial task in every respect and its role exceeds by far that of a simple data provider. More satellites, higher accuracy, higher toll revenues Server has been designed for collaboration with multi-satellite OBUs, i.e. with on-board units that are able to determine their position using all three satellite systems: GPS, GLONASS and GALILEO. Thanks to their multi-satellite capability, the Unit OBUs developed by Siemens generate reliable revenues for the toll operator because they provide accurate positioning data at all times, even in areas with limited signal quality. Test drives through Vienna s historic city center confirmed that a combination of GPS / GLONASS delivers significantly more accurate data than purely GPS-based positioning. As a result, the system reliably distinguishes between closely-spaced neighboring streets, and very rarely encounters problems with signal reception even in areas where highrise buildings obscure the satellite signals. Reliable toll collection in all kinds of tolling landscapes The Siemens back-office system is EETScompliant and thus suitable for use in many European countries. It adapts to the widest range of tolling landscapes and system architectures. Server works just as well with smart-client solutions (geo-data, toll domains etc. are stored in the OBU) as with thin-client solutions (the back-office system holds those data). Neither does it matter if data collection relies solely on satellite signals or if it also integrates microwave-based sensor solutions. Server is absolutely flexible and compatible with a wide variety of technologies and any tolling scenario up to area toll schemes covering all road classes. The back-office system can be integrated smoothly into existing technical system landscapes and easily adapted to new OBU models. Server takes over the four core functions of a tolling back-office: toll calculation as well as management, monitoring and updating of the on-board units. Meets the strictest demands also in terms of data privacy protection The OBU transfers only those data to Server that are required for toll charging, so the privacy of the road users is always protected. The OBU uses powerful cryptographic algorithms for digitally signing all transmitted information. Server comprises a special security module that authenticates and decodes the incoming data telegrams before storing them in a secure memory sector. If required, the original data telegram, including its signature, is stored in the system as well, so that the original data can be retrieved for verification or recalculation purposes, for instance in the event of a legal dispute. For data transmission between the OBUs and Server, the system uses mobile radio technology. In case the mobile radio network is temporarily unavailable, the OBU can store the data even for several days until the communication system is up and running again. Server checks the tolling data for plausibility, completeness and possible repeat transmissions before passing the validated data sets on to the toll operator s central billing system. 2

3 Main tasks of Server and interaction with other components Vehicles subject to toll Unit Server Collection of tolling data Toll system operator Central system Server, the Siemens back-office system for electronic toll collection, can be smoothly integrated into any technical system landscape. It perfectly fulfills its role as link between the on-board units in the vehicles and the toll operator s billing system. With an inclusive range of functions and detection rates of 99.5% percent and higher, provides for reliable and effective toll collection on the basis of legally acceptable evidence. OBU management OBU updating OBU monitoring Value-added services The satellite-based tolling system GNSS GPS GLONASS GALILEO Server DSRC Unit Microwave Monitor by Siemens is the ideal tolling system for today s needs: Its deployment does not require any roadside infrastructure; the system is suitable for any class of road, from motorways down to the smallest country road; and the scope of the tolled road network can be adapted or extended easily and quickly per software update. Our portfolio covers the entire front-end for a tolling solution: an easy-to-use on-board unit ( Unit), a universal back-office system ( Server) and an intelligent enforcement solution ( Monitor). Toll system operator Central system Customer access 3

4 Server: Key functions and technical specification (selected data) Tolling data collection OBU management Positioning Identification of tolled roads and determination of toll-related parameters Data validation and filtering Calculation of road usage data Transmission of tolling data Definition of tolling scenarios and configuration of tolling parameters Management of geographical data Compilation of reports on the collected data OBU usage management, including: Personalization of the OBUs Activation / de-activation of an OBU for a specific toll domain Enabling / disabling of individual OBUs Warning in case of low prepaid account balance Monitoring function for OBUs, including: Startup, wakeup Shutdown Trouble-shooting Updating of OBUs Monitoring of OBUs Value-added services The updates are transmitted over the air via the GSM interface and carried out in the background during ongoing operation. Typical update events: Distribution of software updates (operating system / OS, firmware and applications) Transmission of configuration data and geo-data to an operator-specified group of OBUs The OBUs are monitored as to: Correct operation Compliance with applicable toll rules Processing of messages on monitoring events such as startup, wakeup, shutdown, user interventions, statistical data on technical interfaces or unexpected exceptions Value-added services can be implemented individually without impacting the regular toll collection functions. Typical value-added services are for instance: Recording of positioning data (Track&Trace) Detection of up to 30,000 zones and generation of messages regarding entry and exit times Messaging service Recording of DSRC transactions for monitoring purposes Recording of other data (e.g. driver interventions, speed etc.) Number of OBUs Currently up to 2,000,000 Detection rate > 99.5% System availability Depending on requirements (typically 99.9%) Detection algorithms Security procedures Central or distributed Zones Waypoint section recognition for the efficient identification of higher-class road networks (Siemens patent) Map matching Multi-zone (numerous small toll zones) Distance calculation RSA 1024, RSA 2048 for signatures and authentication ECDSA 256 for signatures and authentication AES 256 for encryption SHA 2 for secure hashing Support of hardware security modules 4 Note: This specification cannot claim to cover all details of Server or possible product variations. Subject to change without prior notice.

5 Server: Key benefits EETS compatibility enables use in a large number of countries Support for several GNSS and DSRC toll domains Open interface to toll operator system acc. to ISO TS Scalability and high availability Automatic encryption, high level of data security and privacy protection Life-cycle management for on-board units Over-the-air update of software and geo-data in the OBU Monitoring of OBUs as to correct operation and possible tampering Additional functions for a wide variety of value-added telematics services DSRC: Dedicated Short Range Communication EETS: European Electronic Toll Service GALILEO: Satellite system of the European Union GLONASS: Global Navigation Satellite System (Russia) GNSS: Global Navigation Satellite Systems GPS: Global Positioning System (USA) GSM: Global System for Mobile Communication OBU: On-Board Unit 5

6 Siemens AG Infrastructure & Cities Sector Mobility and Logistics Division Road and City Mobility Hofmannstrasse Munich Germany Siemens AG 2013 All rights reserved Printed in Germany WS Dispo No K No. 678 Order No. A19100-V350-B161-X-7600 The information in this document contains general descriptions of the technical options available, which do not always have to be present in individual cases. The required features should therefore be specified in each individual case at the time of closing the contract.

siemens.com/tolling Sitraffic Sensus in Slovakia Successful tolling system. Implemented in only 11 months.

siemens.com/tolling Sitraffic Sensus in Slovakia Successful tolling system. Implemented in only 11 months. siemens.com/tolling Sitraffic Sensus in Slovakia Successful tolling system. Implemented in only 11 months. The world s most modern toll collection system started on schedule in Slovakia Around 240,000

More information

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

Maintain Fleet Management Solutions Using Wide Area Wireless Technology Maintain Fleet Management Solutions Using Wide Area Wireless Technology Andreas Kohn Sierra Wireless, Inc. August, 2010 1 Introduction Wireless technology can provide a competitive advantage in today s

More information

Securing Wireless Access for Vehicular Environments (WAVE)

Securing Wireless Access for Vehicular Environments (WAVE) Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the

More information

Electronic Toll Collection

Electronic Toll Collection PIARC International Seminar Intelligent Transport Systems (ITS) in Road Network Operations Electronic Toll Collection Approaches, technologies, experiences Univ.-Prof. Dr.-Ing. Fritz Busch / Dr.-Ing. Andreas

More information

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management

More information

Service Overview CloudCare Online Backup

Service Overview CloudCare Online Backup Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

Anders Betalen Voor Mobiliteit

Anders Betalen Voor Mobiliteit Anders Betalen Voor Mobiliteit Phase 2 Market Consultation Total Cost of System and Organization for KMP Siemens response Management Overview Siemens 2006 TABLE OF CONTENTS 1. INTRODUCTION 3 2. IMPLEMENTATION

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton

More information

Date Reference Edition Page 04.08.2006 EXT_MVW_0002_01_PS 02 1/67

Date Reference Edition Page 04.08.2006 EXT_MVW_0002_01_PS 02 1/67 04.08.2006 EXT_MVW_0002_01_PS 02 1/67 Management Summary Within the project Cost Monitor the Ministry of Transport, Public Works and Water Management tasked mm-lab with the provision of cost information

More information

Service Overview. Business Cloud Backup. Introduction

Service Overview. Business Cloud Backup. Introduction Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

RECOMMENDATION ITU-R M.1453-1 * Transport information and control systems Dedicated short range communications at 5.8 GHz

RECOMMENDATION ITU-R M.1453-1 * Transport information and control systems Dedicated short range communications at 5.8 GHz Rec. ITU-R M.1453-1 1 RECOMMENDATION ITU-R M.1453-1 * Transport and control systems Dedicated short range communications at 5.8 GHz (Question ITU-R 205/8) (2000-2002) The ITU Radiocommunication Assembly,

More information

u-blox comprehensive approach to multi-gnss positioning

u-blox comprehensive approach to multi-gnss positioning WHITEPAPER u-blox comprehensive approach to multi-gnss positioning locate, communicate, accelerate Whitepaper by: Carl Fenger, Communications Manager, u-blox Uffe Pless, Product Manager, u-blox May 2012

More information

The TrimTrac Locator: A New Standard in Practical and Affordable Asset Tracking

The TrimTrac Locator: A New Standard in Practical and Affordable Asset Tracking The TrimTrac Locator: A New Standard in Practical and Affordable Asset Tracking By Bill Dussell Director, Integrated Products Trimble Navigation 15-December-2003 1997 2003, Trimble Navigation Limited.

More information

Accenture Mobility Services Mobility for Better Business Outcomes. IBTTA 80 th Annual Meeting & Exhibition

Accenture Mobility Services Mobility for Better Business Outcomes. IBTTA 80 th Annual Meeting & Exhibition Accenture Mobility Services Mobility for Better Business Outcomes IBTTA 80 th Annual Meeting & Exhibition Mobile Tolling Solution & Demonstration September, 2012 Orlando Accenture, its logo, and High Performance

More information

Czech electronic toll collection two and half years of experiences.

Czech electronic toll collection two and half years of experiences. Czech electronic toll collection two and half years of experiences. Prague, 15th October, 2009 Ing. Karel Feix General Director 1 Basic facts about Czech ETC. Toll for vehicles over 12 tons maximum gross

More information

Certification Report

Certification Report Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Smart Transportation Pricing - Technical Architectures. Cisco Internet Business Solutions Group - December 2008

Smart Transportation Pricing - Technical Architectures. Cisco Internet Business Solutions Group - December 2008 Smart Transportation Pricing - Technical Architectures Cisco Internet Business Solutions Group - December 2008 Smart Transportation Pricing - Applications Citizen Register and Update Vehicle profiles Personal

More information

Always one step ahead.

Always one step ahead. Always one step ahead. Image 25.4 x 5.28 cm 1 DSRC - Components basics for multi application solutions. Image 25.4 x 5.28 cm 14 th European Parking Congress, Vienna, 23-25 of September 2009 DI Werner Dreschl

More information

Secure Wireless Application Platform

Secure Wireless Application Platform Texas Instruments SW@P Secure Wireless Application Platform New Challenges for Wireless Handsets Open Environment Multi-application, Interoperability Multiple Access Data Paths GSM/GPRS, EDGE, 802.11,

More information

COMMUNICATIONS SYSTEMS USED FOR ITS

COMMUNICATIONS SYSTEMS USED FOR ITS COMMUNICATIONS SYSTEMS USED FOR ITS Index Purpose Description Technologies 1 of 5 Purpose The telecommunication system is the main element for the development of telematics in Transport field. It enables

More information

Improving Quality of GNSS Vehicle Localization

Improving Quality of GNSS Vehicle Localization Improving Quality of GNSS Vehicle Localization Roman Srp ITS&S FP7 Easy OBU project Telematika, Legislativa, Strategie, 11.4.2014, Praha Contents EasyOBU Research in a Nutshell Signal Loss in GNSS Applications

More information

Professional slope and fleet management with snow depth measurement. SNOWsat

Professional slope and fleet management with snow depth measurement. SNOWsat Professional slope and fleet management with snow depth measurement SNOWsat by PistenBully Help from above An overview is essential to map and understand the complex cost structures in the ski resort and

More information

NotifyLink Enterprise Edition GroupWise Version White Paper

NotifyLink Enterprise Edition GroupWise Version White Paper NotifyLink Enterprise Edition GroupWise Version White Paper We Link your Wireless Choices Together! Notify Technology Corporation 1054 S. DeAnza Blvd, Suite 105 San Jose, CA 95129 www.notifycorp.com Copyright

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

the analog PSTN. digital subscriber line (ISDN).

the analog PSTN. digital subscriber line (ISDN). General System Features Architecture and Network Fax Encryption Appliance Analog Line Connectivity (PSTN) Digital Line Connectivity (ISDN) (optional) IP Network Connectivity (optional) Key Management Server

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

Intelligent Parking Solutions. Intelligent Traffic Systems

Intelligent Parking Solutions. Intelligent Traffic Systems Intelligent Parking Solutions Intelligent Traffic Systems A new world of parking Drivers, urban planners and private car park operators have totally different takes on the parking issue. It s a good thing

More information

NetVision. NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management. Solution Datasheet

NetVision. NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management. Solution Datasheet Version 2.0 - October 2014 NetVision Solution Datasheet NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management According to analyst firm Berg Insight, the installed base

More information

siemens.com/mobility Traffic data analysis in Sitraffic Scala/Concert The expert system for visualization, quality management and statistics

siemens.com/mobility Traffic data analysis in Sitraffic Scala/Concert The expert system for visualization, quality management and statistics siemens.com/mobility Traffic data analysis in Sitraffic Scala/Concert The expert system for visualization, quality management and statistics 2 Traffic data analysis produces transparent intersections The

More information

SITRAFFIC Canto communication system. A technological leap in center-to-field communication. Intelligent Traffic Systems

SITRAFFIC Canto communication system. A technological leap in center-to-field communication. Intelligent Traffic Systems SITRAFFIC Canto communication system A technological leap in center-to-field communication Intelligent Traffic Systems SITRAFFIC Canto: Take advantage of all the benefits of a future-oriented technology

More information

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with

More information

PrivyLink Cryptographic Key Server *

PrivyLink Cryptographic Key Server * WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology

More information

THE PROSPECTS FOR ELECTRONIC FEE COLLECTION (EFC) USING VEHICLE POSITIONING SYSTEMS (VPS)

THE PROSPECTS FOR ELECTRONIC FEE COLLECTION (EFC) USING VEHICLE POSITIONING SYSTEMS (VPS) THE PROSPECTS FOR ELECTRONIC FEE COLLECTION (EFC) USING VEHICLE POSITIONING SYSTEMS (VPS) erp1110 paper on VPS for Turin World Congress.doc by Ian Catling, Ian Catling Consultancy, Ash Meadow, Bridge Way,

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...

More information

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted

More information

Safety and security related features in AUTOSAR

Safety and security related features in AUTOSAR Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22

More information

Setting Processes for Electronic Signature

Setting Processes for Electronic Signature Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000

More information

ProSyst Software AG. for a smarter world. EuroCargo 2004 Joachim Ritter. Technical Consultant, ProSyst Software

ProSyst Software AG. for a smarter world. EuroCargo 2004 Joachim Ritter. Technical Consultant, ProSyst Software ProSyst Software AG for a smarter world. EuroCargo 2004 Joachim Ritter Technical Consultant, ProSyst Software 1 Overview Telematic Services Driver-Centric Services Safety (Curve warning) Efficiency (Predictive

More information

Underground mine traffic management and optimization: an intelligent application based on a real-time localization system

Underground mine traffic management and optimization: an intelligent application based on a real-time localization system Varandas et al: Underground mine traffic management and optimization 1 Underground mine traffic management and optimization: an intelligent application based on a real-time localization system N.Varandas,

More information

Certification Report

Certification Report Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria

More information

Software as a Service and the growth of ITS

Software as a Service and the growth of ITS 19th ITS World Congress, Vienna, Austria, 22/26 October 2012 AM-00014 Software as a Service and the growth of ITS Matthew Dorfman D Artagnan Consulting LLP, USA 4700 9 th St. S Arlington VA 22204 +1 703-608-4321

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification

More information

Cisco Trust Anchor Technologies

Cisco Trust Anchor Technologies Data Sheet Cisco Trust Anchor Technologies Overview Cisco Trust Anchor Technologies provide the foundation for trustworthy systems across Cisco. The Cisco Trust Anchor and a Secure Boot check of signed

More information

Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording

Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording 9-1-1 Magazine / published in December 2007 Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording by Andreas Potyka, Product Management, ASC telecom AG VoIP communications

More information

CELEBRATING YEARS MARKET LEADERSHIP 1989-2013

CELEBRATING YEARS MARKET LEADERSHIP 1989-2013 CELEBRATING YEARS MARKET LEADERSHIP 1989-2013 WHAT IS TELEMATICS? Telematics is the use of a device (black box) that collects and transmit data about how a vehicle is performing, the speed and distance

More information

ETC-based ITS Applications.

ETC-based ITS Applications. ETC-based ITS Applications. Implementing value-adding ITS applications on basis of Kapsch ETC systems. UNECE Meeting Ankara; March 2012 Insert photo: 9.64 mm high x 25.4 mm wide 02.12.2009 Titel der Präsentation

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

IBM Sterling Warehouse Management System

IBM Sterling Warehouse Management System IBM Sterling Warehouse Management System Increase warehouse productivity and reduce costs Overview In this solution overview, you will learn: How you can improve every aspect of your warehouse operations

More information

TABLE OF CONTENTS. The Challenges 3. The Solution 4. Hardware 5. Software 6. Benefits 8. Contact Us 9. About HCL 10

TABLE OF CONTENTS. The Challenges 3. The Solution 4. Hardware 5. Software 6. Benefits 8. Contact Us 9. About HCL 10 TABLE OF CONTENTS The Challenges 3 The Solution 4 Hardware 5 Software 6 Benefits 8 Contact Us 9 About HCL 10 THE CHALLENGES Organizations managing and running Fleet usually operate on razor thin margins.

More information

2014 IBM Corporation

2014 IBM Corporation 2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session

More information

EB Automotive Driver Assistance EB Assist Solutions. Damian Barnett Director Automotive Software June 5, 2015

EB Automotive Driver Assistance EB Assist Solutions. Damian Barnett Director Automotive Software June 5, 2015 EB Automotive Driver Assistance EB Assist Solutions Damian Barnett Director Automotive Software June 5, 2015 Advanced driver assistance systems Market growth The Growth of ADAS is predicted to be about

More information

METER DATA MANAGEMENT FOR THE SMARTER GRID AND FUTURE ELECTRONIC ENERGY MARKETPLACES

METER DATA MANAGEMENT FOR THE SMARTER GRID AND FUTURE ELECTRONIC ENERGY MARKETPLACES METER DATA MANAGEMENT FOR THE SMARTER GRID AND FUTURE ELECTRONIC ENERGY MARKETPLACES Sebnem RUSITSCHKA 1(1), Stephan MERK (1), Dr. Heinrich KIRCHAUER (2), Dr. Monika STURM (2) (1) Siemens AG Germany Corporate

More information

Ciphire Mail. Abstract

Ciphire Mail. Abstract Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the

More information

Encrypting Business Files in the Cloud

Encrypting Business Files in the Cloud Quick Guide for IT-Security and Data Privacy Encrypting Business Files in the Cloud Requirements for data security in the cloud End to end encryption Secure file transfers Data Security in the Cloud A

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

Trainguard Sirius CBTC

Trainguard Sirius CBTC siemens.com/mobility Trainguard Sirius CBTC For efficient mass transit operation Trainguard Sirius CBTC Trainguard Sirius communication based train control (CBTC) is Siemens Rail Automation s solution

More information

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage

More information

Leica Monitoring Solutions. Leica Monitoring Solutions Certainty builds confidence.

Leica Monitoring Solutions. Leica Monitoring Solutions Certainty builds confidence. Leica Monitoring Solutions Leica Monitoring Solutions Certainty builds confidence. Risk and Cost Reduction Proven Solutions Facing new challenges Engineering companies and contractors are facing challenges

More information

IBM Crypto Server Management General Information Manual

IBM Crypto Server Management General Information Manual CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.

More information

National payment hub for clearing and settlement

National payment hub for clearing and settlement NCR APTRA CLEAR National payment hub for clearing and settlement Shifting payment dynamics: The international scope Every country has some form of unique payment system based on its own financial practices,

More information

Wireless Troubleshooting

Wireless Troubleshooting Wireless Troubleshooting Applicable Version: 10.00 onwards Applicable Models: All WiFi Models - CR15wi, CR15wiNG, CR25wi, CR25wiNG, CR35wi, CR35wiNG Connectivity Issues with Cyberoam Inbuilt Access points

More information

The rise and challenges of M2M applications

The rise and challenges of M2M applications WHITEPAPER The rise and challenges of M2M applications 12 practical considerations for connected designs locate, communicate, accelerate Whitepaper by: Herbert Blaser, VP Business Marketing, u-blox Carl

More information

Deploy WiFi Quickly and Easily

Deploy WiFi Quickly and Easily Deploy WiFi Quickly and Easily Table of Contents 3 Introduction 3 The Backhaul Challenge 4 Effortless WiFi Access 4 Rate Limiting 5 Traffic Filtering 5 Channel Selection 5 Enhanced Roaming 6 Connecting

More information

NotifyLink Enterprise Edition GroupWise Version White Paper

NotifyLink Enterprise Edition GroupWise Version White Paper NotifyLink Enterprise Edition GroupWise Version White Paper We Link your Wireless Choices Together! Notify Technology Corporation 1054 S. DeAnza Blvd, Suite 105 San Jose, CA 95129 www.notifycorp.com Copyright

More information

2007 Microsoft Office System Document Encryption

2007 Microsoft Office System Document Encryption 2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft

More information

Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview

Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview Application Note Atmel CryptoAuthentication Product Uses Atmel Abstract Companies are continuously searching for ways to protect property using various security implementations; however, the cost of security

More information

3.4 SCS Technologies for Container Integrity: Track/Trace or Positioning technologies

3.4 SCS Technologies for Container Integrity: Track/Trace or Positioning technologies 3.4 SCS Technologies for Container Integrity: Track/Trace or Positioning technologies It seems evident that if authorities are concerned about the potential misuse of containers by criminals or terrorists,

More information

White paper Power Consumption Monitoring of PRIMERGY Servers in System Center Operations Manager

White paper Power Consumption Monitoring of PRIMERGY Servers in System Center Operations Manager White paper Power Consumption Monitoring of PRIMERGY Servers in System Center Operations Manager This technical white paper describes how to use the Power Management Packs published by Microsoft for Operations

More information

Open EMS Suite. O&M Agent. Functional Overview Version 1.2. Nokia Siemens Networks 1 (18)

Open EMS Suite. O&M Agent. Functional Overview Version 1.2. Nokia Siemens Networks 1 (18) Open EMS Suite O&M Agent Functional Overview Version 1.2 Nokia Siemens Networks 1 (18) O&M Agent The information in this document is subject to change without notice and describes only the product defined

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

Astaro Mail Archiving Service Version 1.0

Astaro Mail Archiving Service Version 1.0 Astaro Mail Archiving Service Version 1.0 Process documentation Table of Contents 1. Introduction... 2 2. Overview... 2 2.1 Production Cloud... 3 2.2 Backup Cloud... 3 2.3 Control Cloud... 3 2.4 Access

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Tracking Solutions for Fleet Management Systems

Tracking Solutions for Fleet Management Systems Tracking Solutions for Fleet Management Systems By Priya Shukla, Anand Kumar Swami, Neha Kochar and Filippo Colaianni STMicroelectronics Design and development of commercial GPS receivers has gained tremendous

More information

ASI Agenzia Spaziale Italiana Galileo Workshop Roma 26/07/2012. Alessandro Pozzobon, Project Manager & Co-founder Qascom

ASI Agenzia Spaziale Italiana Galileo Workshop Roma 26/07/2012. Alessandro Pozzobon, Project Manager & Co-founder Qascom ASI Agenzia Spaziale Italiana Galileo Workshop Roma 26/07/2012 Alessandro Pozzobon, Project Manager & Co-founder Qascom Who is Qascom Quality And Secure COMmunications 2005 - Bassano del Grappa Focused

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

More efficient logistics processes with FleetBoard Logistics Management.

More efficient logistics processes with FleetBoard Logistics Management. A Daimler company A Daimler company More efficient logistics processes with FleetBoard Logistics Management. About FleetBoard Daimler FleetBoard GmbH with headquarters in Stuttgart offers telematics-supported

More information

ADM:49 DPS POLICY MANUAL Page 1 of 5

ADM:49 DPS POLICY MANUAL Page 1 of 5 DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The

More information

PRIVACY POLICY. 3.3.1 The type of web browser and operating system you have used:

PRIVACY POLICY. 3.3.1 The type of web browser and operating system you have used: PRIVACY POLICY 1.0 Title: Privacy Policy Version Control: 1.0 Date of Implementation: 2015-03-16 2.0 Summary This document sets forth the Privacy Policy (the Policy ) that is designed to provide you with

More information

Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services

Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services Journal of Global Positioning Systems (2004) Vol. 3, No. 1-2: 200-207 Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services Oscar Pozzobon 1, Chris Wullems 1, Kurt Kubik 2 1

More information

How can I manage all automation software tasks in one engineering environment?

How can I manage all automation software tasks in one engineering environment? How can I manage all automation software tasks in one engineering environment? With Totally Integrated Automation Portal: One integrated engineering framework for all your automation tasks. Answers for

More information

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved 49358431 Page 1 of 12 About this document This document describes the features, testing and deployment

More information

FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager

FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager LogRhythm 3195 Sterling Circle, Suite 100 Boulder CO, 80301 USA September 17, 2012 Document Version 1.0 Module Version 6.0.4 Page 1 of 23 Copyright

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

TRANSPORT SERVICE. RFID Vehicle Outbound Logistics Management Case Study

TRANSPORT SERVICE. RFID Vehicle Outbound Logistics Management Case Study TRANSPORT SERVICE RFID Vehicle Outbound Logistics Management Case Study NV TRANSPORT SERVICE NV Transport Service (TS) a subsidiary of Hödlmayr International AG and Autologic Holding plc is the releasing

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement

IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement Smart Roadside is the leading law enforcement platform in commercial vehicle safety. Our success is defined by delivering real world

More information

Verizon Wireless Field Force Manager Device User Guide

Verizon Wireless Field Force Manager Device User Guide Verizon Wireless Field Force Manager Device User Guide Verizon Wireless Field Force Manager Device User Guide Table of Contents General Information...4 System requirements...4 Privacy and mobility...4

More information

M-Shield mobile security technology

M-Shield mobile security technology Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a

More information

Lecture VII : Public Key Infrastructure (PKI)

Lecture VII : Public Key Infrastructure (PKI) Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards

FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards 3Com Corporation 5403 Betsy Ross Drive Santa Clara, CA 95054 USA February 24, 2006 Revision Version 0.4 Page 1 of 15 1. Introduction The following

More information

INTEGRATION OF DIGITAL SIGNATURES INTO THE EUROPEAN BUSINESS REGISTER. Abstract:

INTEGRATION OF DIGITAL SIGNATURES INTO THE EUROPEAN BUSINESS REGISTER. Abstract: INTEGRATION OF DIGITAL SIGNATURES INTO THE EUROPEAN BUSINESS REGISTER Helmut Kurth Industrieanlagen Betriebsgesellschaft mbh Einsteinstr. 20 D-85521 Ottobrunn, Germany kurth@iabg.de Abstract: In the INFOSEC

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Dell Client BIOS: Signed Firmware Update

Dell Client BIOS: Signed Firmware Update Dell Client BIOS: Signed Firmware Update An Implementation and Deployment Guide to NIST SP800-147 BIOS Protections for Dell Client BIOS Rick Martinez Dell Client BIOS This white paper is for informational

More information

Electronic Registration Identification (ERI)

Electronic Registration Identification (ERI) Electronic Registration Identification (ERI) Concept, architecture and current status Murcia, 18th June 2009 Overview The ERI standard User requirements Architecture Current status 2 Electronic Registration

More information