Ubiquitous Public Key Infrastracture

Size: px
Start display at page:

Download "Ubiquitous Public Key Infrastracture"

From this document you will learn the answers to the following questions:

  • What key is needed for a public key system?

  • What is the purpose of PKI Issues in our Society?

  • For public key systems , what is the key?

Transcription

1 Ubiquitous Public Key Infrastracture TWISC at NTUST on December 27 Ken Umeno RIKEN and NICT

2 Outline PKI Issues in our Society Our Proposal towards Ubiquitous PKI Discussion for Future Studies

3 I encrypt, and you decrypt.

4 You encrypt, and I decrypt.

5 No. of Keys for Encryption in N Users Environment: N(N-1)/2 symmetric keys for one-toone secure communications. 2 N -2 symmetric keys for one-to-others secure communications. Symmetric key encryption systems are not scalable.

6 Why Public Key Infrastractures?

7 I encrypt, and you decrypt. For public key systems, I encrypt with your public key and you decrypt with your private key. A pair of your public key and private key is generated at your hand and you can distribute your public key.

8 You encrypt, and I decrypt. For public key systems, You encrypt with my public key and I decrypt with my private key. A pair of my public key and private key is generated at my hand and I can distribute my public key.

9 No. of Keys for Encryption in N Users Environment: PKI N public keys for one-to-one secure communications. N public keys for one-to-others secure communications. Public key encryption systems are scalable and suitable for large scale networks.

10 PKI and our Society PKI is a pillar of our e-society such as E-Government System, e-commerce, e-health (for protecting your medical data and Health insurance data) (USB memory used for ikey (Australia, USA)) For business, authentication server systems for ensuring server s public key as a trusted third party, called CA(Certificate Authority) is rapidly growing.

11 Current Issues of PKI: Why you don t have my public key?

12 Finland s Case National Initiative of PKI Program: 5,274,820 Population: Issues of National PKI: Extra Device (Smart Card Solution) Costs is High for installing private key and public key.

13 So far, We have seen that internet access costs had been virtually free. Cf. Free Internet Caffe at Airports like Singapore Hub airport. For users, service is vitally important. Business model for Internet was drastically changed.

14 From now on, We will see that wireless internet access will also become free and wireless internet access will be ubiquitous with communications terminals such as mobile phones, PDA, vital sensors,.e.t.c. in 5-10 years (soon).

15 Security of Ubiquitous Networks (Real Issues) For ensuring security of large scale ubiquitous networks connecting users and mobile phones and various sensors, PKI implementation is virtually unavoidable for any kind of services because of the terminal authentication mechanism of PKI. How to implement PKI for ubiquitous network environment?

16 Mobile Phone = Digital Camera Currently, most mobile phone have cameras and digital camera makers will equipe digital camera with wireless internet access. Most mobile phone with cameras can read QR code (two-dimensional code).

17 What is QR code? My QR code:

18 QR codes in Japan More than 30.6 million 3G mobile phone of NTT docomo can read QR codes. There are three operators (NTT docomo, KDDI, Softbank). Almost all mobile phone can read QR codes and they are currently used for the gateway code for wireless internet access.

19 QR Codes Specification Maximal Capacity: 2953 byte

20 Our Proposal to Implementation of Ubiquitous PKI To use two-dimensional code such as QR code which is readable by mobile phones with cameras and is printable as public key.

21 What is Merit? My public key is printable and I can distribute my public key by distributing name cards or other papers with printed public keys. Your public key can be read with my mobile phone anytime, anywhere.

22 QPKI (Quadrature PKI) card exchange= public key exchange Alice Bob

23 History of QR Code Standardization QR Code Standardization October, Approved as AIM International (Automatic 1997 Identification Manufacturers International) standard (ISS - QR Code) March, 1998 Approved as JEIDA (Japanese Electronic Industry January, 1999 June, 2000 November, 2004 Development Association) standard (JEIDA-55) Approved as JIS (Japanese Industrial Standards) standard (JIS X 0510) Approved as ISO international standard (ISO/IEC18004) Micro QR Code is Approved as JIS (Japanese Industrial Standards) standard (JIS X 0510)

24 Ubiquitous PKI Service Image C.f. (ProtoType System) Key server registration use from web application use for encryption

25 Current Issues No standard for two-dimensional bar codes except QR code and No stadard protocol between two-dimensional codes and public keys. No standard software development platform in mobile phone ( in a limited computing resource)

26 Our porposal for possible collaboration is: To set up a unique interoperable twodimensional codes system which can be readable by mobile phone in 3G by doing research and develop of codes suitable for public key storing, and to standardize it towards establishing security in our ubiquitous network society. To develope ubiquitous wireless terminals which can read the above code.

27 Thank you.

Public Key Infrastructure for a Higher Education Environment

Public Key Infrastructure for a Higher Education Environment Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware

More information

Design and Evaluation of Scalable Ubiquitous Discovery System

Design and Evaluation of Scalable Ubiquitous Discovery System Design and Evaluation of Scalable Ubiquitous Discovery System Tomohiro NAKAGAWA Takashi YOSHIKAWA Ken OHTA Hiroshi INAMURA Shoji KURAKAKE NTT DoCoMo, Inc., Japan ASWN2004 Outline Background, Goal, Scenario

More information

Evolution of mobile broadband and T&M business LTE

Evolution of mobile broadband and T&M business LTE Evolution of mobile broadband and T&M business LTE business July 29, 2010 Kenji Tanaka Anritsu Corporation President of T&M group Kenji Tanaka Tokyo Stock Exchange : 6754 http://www.anritsu.com/ja-jp/about-anritsu/investor-relations/

More information

Network Security Protocols

Network Security Protocols Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination

More information

SGFS: Secure, Flexible, and Policy-based Global File Sharing

SGFS: Secure, Flexible, and Policy-based Global File Sharing SGFS: Secure, Flexible, and Policy-based Global File Sharing Vishal Kher Eric Seppanen Cory Leach Yongdae Kim {vkher,seppanen,leach,kyd}@cs.umn.edu University of Minnesota Motivation for Network attached

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer Arcot Systems, Inc. Securing Digital Identities FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer Today s Agenda Background Who is Arcot Systems? What is an ArcotID? Why use

More information

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet Securing the Future of Trust

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

Case Study: NTT DATA and JAL ONLINE Federate Business Travel Expense Reporting

Case Study: NTT DATA and JAL ONLINE Federate Business Travel Expense Reporting Case Study: and JAL ONLINE Federate Business Travel Expense Reporting Company is one of Japan s preeminent systems integration companies with a reputation for innovation and technology excellence. traces

More information

Development of Real-Time Enterprise Communication Service for Ubiquitous Age

Development of Real-Time Enterprise Communication Service for Ubiquitous Age Development of Real-Time Enterprise Communication Service for Ubiquitous Age V Kazumasa Kuroshita V Youichi Nasuno V Katsuaki Taniguchi (Manuscript received May 31, 2006) Smart terminals such as cellular

More information

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Understanding Digital Certificates and Secure Sockets Layer (SSL) Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?

More information

How To Use Pki On A Pc (For A Non-Profit)

How To Use Pki On A Pc (For A Non-Profit) Using PKI for PC Security Public Key Infrastructure (PKI) is an important foundation for network and information security. In essence, PKI provides an enterprise infrastructure for managing the keys necessary

More information

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon 1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly

More information

A Students Attendance System Using QR Code

A Students Attendance System Using QR Code Vol. 5, o. 3, 2014 A Students Attendance System Using QR Code Fadi Masalha Faculty of Information Technology Applied Science University ael Hirzallah Faculty of Information Technology Applied Science University

More information

Safe payments on the Net. Chris Mitchell Information Security Group Royal Holloway, University of London http://www.isg.rhul.ac.

Safe payments on the Net. Chris Mitchell Information Security Group Royal Holloway, University of London http://www.isg.rhul.ac. Safe payments on the Net Chris Mitchell Information Security Group Royal Holloway, University of London http://www.isg.rhul.ac.uk/~cjm Internet e-commerce Focus of this talk is security issues for e-commerce

More information

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999 Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks

More information

Authentication in WLAN

Authentication in WLAN Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing

More information

Mobile Ticket to Ride!

Mobile Ticket to Ride! WHITEPAPER Mobile Ticket to Ride! This whitepaper is an extract from: Mobile Ticketing Applications & Markets Transport, Sport & Entertainment 2009-2014... information you can do business with Mobile Ticket

More information

FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA. Year 2015 Issued on December 11, 2015 Part II

FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA. Year 2015 Issued on December 11, 2015 Part II 1 of 11 FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA Year 2015 Issued on December 11, 2015 Part II 410th Regulation: Cash Register Security Regulation, [RKSV] 410th Regulation by the Federal Minister

More information

Prototype Design of NFC-Based Electronic. Coupon Ecosystem with Object Memory Model

Prototype Design of NFC-Based Electronic. Coupon Ecosystem with Object Memory Model Contemporary Engineering Sciences, Vol. 7, 2014, no. 22, 1105-1112 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49138 Prototype Design of NFC-Based Electronic Coupon Ecosystem with

More information

Authentication is not Authorization?! And what is a "digital signature" anyway?

Authentication is not Authorization?! And what is a digital signature anyway? Authentication is not Authorization?! And what is a "digital signature" anyway? Prepared by R. David Vernon Revised 12/01 Introduction REV 1A As part of the IT Architecture Initiative, the Office of Information

More information

QR Code for Digital Signature Online/Offline Payment. James Wu www.jrsys.com.tw 1

QR Code for Digital Signature Online/Offline Payment. James Wu www.jrsys.com.tw 1 QR Code for Digital Signature Online/Offline Payment James Wu www.jrsys.com.tw 1 Big Risk of Online Shopping You may lost Card Number + Expiration Date + CVV Card Not Present Transaction Trojan, Sniffer,

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

Federated Authentication Mechanism with Efficient ID management

Federated Authentication Mechanism with Efficient ID management Federated Authentication Mechanism with Efficient ID management Ryu Watanabe and Toshiaki Tanaka KDDI R&D Laboratories, Inc. Ohara 2-1-15 Fujimino Saitama, Japan Email: ryu@kddilabs.jp, toshi@kddilabs.jp

More information

Contents. Expertise in access control. SaaS Software as a Service, a comprehensive solution. Megaflex Officeflow

Contents. Expertise in access control. SaaS Software as a Service, a comprehensive solution. Megaflex Officeflow Contents Expertise in access control 3 SaaS Software as a Service, a comprehensive solution 4 Megaflex Officeflow 6 Megaflex control is always secure anytime, anywhere 8 Benefits of using Megaflex 9 Greenbox

More information

Web Machine Interface

Web Machine Interface From Human Machine Interface to Web Machine Interface - Innovation of HMI - -1- Copyright 2014 All Rights Reserved. Web Machine Interface offers two services below: remote access service cloud data utilization

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

A secure mobile payment system *

A secure mobile payment system * Jun. 2007, Volume 1, No.1 (Monthly) Computer Technology and Application, ISSN1934-7332, USA A secure mobile payment system * LI Xi, HU Han-ping (Institute of Pattern Recognition and Artificial Intelligence,

More information

CloudCycle 14: Secure and User-Friendly QR-Code Based Key Distribution

CloudCycle 14: Secure and User-Friendly QR-Code Based Key Distribution CloudCycle 14: Secure and User-Friendly QR-Code Based Key Distribution 22.09.2014, Informatik 2014, Stuttgart Kevin Körner, Thomas Walter The Initial Problem 2/17 K. Körner, T. Walter - Secure and User-Friendly

More information

International Journal for Research in Computer Science

International Journal for Research in Computer Science TOPIC: MOBILE COMPUTING AND SECURITY ISSUES. ABSTRACT Owodele Odukale The past decade has seen a growth in the use of mobile computing. Its use can be found in areas such as social media, information exchange,

More information

Lecture VII : Public Key Infrastructure (PKI)

Lecture VII : Public Key Infrastructure (PKI) Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

A NEW FRAMEWORK FOR BRIDGING THE GAP BETWEEN IT SERVICE MANAGEMENT AND IT GOVERNANCE FROM A SECURITY PERSPECTIVE

A NEW FRAMEWORK FOR BRIDGING THE GAP BETWEEN IT SERVICE MANAGEMENT AND IT GOVERNANCE FROM A SECURITY PERSPECTIVE A NEW FRAMEWORK FOR BRIDGING THE GAP BETWEEN IT SERVICE MANAGEMENT AND IT GOVERNANCE FROM A SECURITY PERSPECTIVE E. da Cruz 1 and L. Labuschagne 2 Academy of Information Technology at the University of

More information

Software Assignments for a Course in Secure E-Commerce

Software Assignments for a Course in Secure E-Commerce Software Assignments for a Course in Secure E-Commerce Chris Steketee and Phillip Lock Advanced Computing Research Centre, School of Comp and Info Science University of South Australia, Mawson Lakes, SA

More information

IQS Identity and Access Management

IQS Identity and Access Management IQS Identity and Access Management Identity Management Authentication Authorization Administration www.-center.com The next generation security solution 2003 RSA Security Conference IAM is a combination

More information

Lightweight Security using Identity-Based Encryption Guido Appenzeller

Lightweight Security using Identity-Based Encryption Guido Appenzeller Lightweight Security using Identity-Based Encryption Guido Appenzeller Chief Technology Officer Voltage Security Inc. Identity-Based Encryption (IBE) IBE is a new public key encryption algorithm A number

More information

Key Management (Distribution and Certification) (1)

Key Management (Distribution and Certification) (1) Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem

More information

Controller of Certification Authorities of Mauritius

Controller of Certification Authorities of Mauritius Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)

More information

Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway

Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document

More information

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,

More information

ISO/IEC 24727 for secure mobile web applications

ISO/IEC 24727 for secure mobile web applications ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, jan.eichholz@gi-de.com 2 Infineon Technologies AG, detlef.houdeau@infineon.com

More information

BYOD Adaption in Banking

BYOD Adaption in Banking BYOD Adaption in Banking A report submitted to the Institute for Development and Reasearch in Banking Technology, Hyderabad In partial fulfillment of the summer internship of Bachelor of Technology In

More information

CONNECTING THE RASPBERRY PI TO A NETWORK

CONNECTING THE RASPBERRY PI TO A NETWORK CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete

More information

Architecture and Technologies for HGW

Architecture and Technologies for HGW Architecture and Technologies for HGW Authors: Masahide Nishikawa* and Shunsuke Nishio* Home information and communication technology (ICT) service systems, where household appliances and devices are linked

More information

CHAPTER 1 Introduction 1

CHAPTER 1 Introduction 1 Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure Expert Reference Series of White Papers Fundamentals of the PKI Infrastructure 1-800-COURSES www.globalknowledge.com Fundamentals of the PKI Infrastructure Boris Gigovic, Global Knowledge Instructor, CEI,

More information

Strong Encryption for Public Key Management through SSL

Strong Encryption for Public Key Management through SSL Strong Encryption for Public Key Management through SSL CH.SUSHMA, D.NAVANEETHA 1,2 Assistant Professor, Information Technology, Bhoj Reddy Engineering College For Women, Hyderabad, India Abstract: Public-key

More information

BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE

BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE Abhishek B. Iyer G.H.Raisoni College of Engineering and Management, Wagholi, Pune, Maharashtra, India- 412 207 Rohit A. Shah G.H.Raisoni College

More information

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

2 Information and Telecommunications

2 Information and Telecommunications Strategic Priority Setting in S&T 2 Information and Telecommunications Information and communication technology sparks an enormous revolution in a wide range of socio-economical activities, including realization

More information

The SIA Standards Roadmap describes the strategies for achieving the mission and enhancing stakeholder participation.

The SIA Standards Roadmap describes the strategies for achieving the mission and enhancing stakeholder participation. Mission Statement The mission of the Security Industry Association (SIA) Standards Committee is to develop and promote the use of technology and application standards for the security industry; provide

More information

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution. IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services Combine resources for one complete online business security solution. Big e-business opportunities demand security to match

More information

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS) Understanding Digital Certificates and Wireless Transport Layer Security (WTLS) Author: Allan Macphee January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What

More information

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security

More information

PKI Deployment Business Issues

PKI Deployment Business Issues An OASIS PKI White Paper PKI Deployment Business Issues By Amir Jafri and June Leung (FundSERV Inc.) For the Oasis PKI Member Section OASIS PKI White Paper OASIS (Organization for the Advancement of Structured

More information

Mark Certificate Verification Services (Manual)

Mark Certificate Verification Services (Manual) Mark Certificate Verification Services (Manual) Introduction This Department conducts the massive Board Examinations 7 lakhs for Higher Secondary 10 lakhs for S.S.L.C 50,000 candidates in Diploma in Elementary

More information

Configuring the WT-4 for ftp (Ad-hoc Mode)

Configuring the WT-4 for ftp (Ad-hoc Mode) En Configuring the WT-4 for ftp (Ad-hoc Mode) Mac OS X Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Mac OS X (10.5.2) ftp server for transmission

More information

E-Business Technologies for the Future

E-Business Technologies for the Future E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview

More information

First Semester Examinations 2011/12 INTERNET PRINCIPLES

First Semester Examinations 2011/12 INTERNET PRINCIPLES PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

More information

Configuring the WT-4 for Upload to a Computer (Ad-hoc Mode)

Configuring the WT-4 for Upload to a Computer (Ad-hoc Mode) En Configuring the WT-4 for Upload to a Computer (Ad-hoc Mode) Windows XP This document provides basic instructions on configuring the WT-4 wireless transmitter and a Windows XP Professional SP2 computer

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless

More information

Public Key Infrastructure

Public Key Infrastructure UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

Introducing etoken. What is etoken?

Introducing etoken. What is etoken? Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant

More information

Nokia Mobile Software Strategy

Nokia Mobile Software Strategy Nokia Mobile Software Strategy Pertti Korhonen Senior Vice President Nokia Mobile Software Agenda Open Mobile Architecture initiative Nokia Mobile Software strategy & Offering Developer community Summary

More information

Asymmetric cryptosystems fundamental problem: authentication of public keys

Asymmetric cryptosystems fundamental problem: authentication of public keys Network security Part 2: protocols and systems (a) Authentication of public keys Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Asymmetric cryptosystems fundamental

More information

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure CSE543 - Introduction to Computer and Network Security Module: Public Key Infrastructure Professor Trent Jaeger 1 Meeting Someone New Anywhere in the Internet 2 What is a certificate? A certificate makes

More information

SSL/TLS: The Ugly Truth

SSL/TLS: The Ugly Truth SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team adrian.hayter@cnsuk.co.uk Contents Introduction to SSL/TLS Cryptography

More information

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1 PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority

More information

M2M For industrial and automotive

M2M For industrial and automotive M2M For industrial and automotive Content ST at a glance... 4 Where to find us... 5 The value chain... 5 Secure MCU... 6 Focus on ST33 secure microcontrollers... 6 M2M fields of application... 7 What is

More information

TrustKey Tool User Manual

TrustKey Tool User Manual TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...

More information

Parallels Business Automation 4.3

Parallels Business Automation 4.3 Parallels Parallels Business Automation 4.3 Advanced Security Configuration Guide Revision 1.0.04 (c) 1999-2008 ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425)

More information

PKI - current and future

PKI - current and future PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi

More information

Reducing Configuration Complexity with Next Gen IoT Networks

Reducing Configuration Complexity with Next Gen IoT Networks Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration

More information

Project Chase Manhattan

Project Chase Manhattan T-NetSix Enon Corporation Project Chase Manhattan How T-NetSix Enon Corporation created new innovative mobile banking solution for Chase Manhattan bank Company background: T-NetSix Enon is a IT services

More information

Firewalls. Outlines: By: Arash Habibi Lashkari July 2010. Network Security 06

Firewalls. Outlines: By: Arash Habibi Lashkari July 2010. Network Security 06 Firewalls Outlines: What is a firewall Why an organization ation needs a firewall Types of firewalls and technologies Deploying a firewall What is a VPN By: Arash Habibi Lashkari July 2010 1 Introduction

More information

Input and Output of ISM-Benchmark

Input and Output of ISM-Benchmark Information Security Measures Benchmark (ISM-Benchmark) Ms. Yasuko Kanno, Chief Advisor, IT Security Center, Information-technology Promotion Agency (IPA) Japan Abstract This paper presents introduction

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Fieldservers as Real-time Monitoring Tools for Ubiquitous Sensor Networks

Fieldservers as Real-time Monitoring Tools for Ubiquitous Sensor Networks Fieldservers as Real-time Monitoring Tools for Ubiquitous Sensor Networks Aadit Shrestha, Rassarin Ch., HONDA Kiyoshi, Apichon Witayangkurn Asian Institute of Technology Hiroshi SHIMAMURA elab experience

More information

Longmai Mobile PKI Solution

Longmai Mobile PKI Solution Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2

More information

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services / BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment

More information

Reliable Authentication Method by Using Cellular Phones in WBT

Reliable Authentication Method by Using Cellular Phones in WBT Reliable Authentication Method by U Title Phones in WBT Author(s) Takamizawa, Hideyuki; Kaijiri, Kenj International Conference on International Conference on Citation International Conference on Issue

More information

Demonstration of Barcodes to QR Codes through Text Using Document Software

Demonstration of Barcodes to QR Codes through Text Using Document Software Demonstration of Barcodes to QR Codes through Text Using Document Software Dr. Neeraj Bhargava 1, Anchal kumawat 2, Dr. Ritu Bhargava 3 Associate Professor, Department of Computer Science, School of Engineering

More information

Special Properties of Ad-hoc Wireless Network and Security Models

Special Properties of Ad-hoc Wireless Network and Security Models Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland E-mail: hzho023@aucklanduni.ac.nz Abstract:There are certain amounts of

More information

Smart Meter PKI - Make or Buy?

Smart Meter PKI - Make or Buy? ID WORLD Frankfurt 20.11.2014 11:15 11:45 Uhr Smart Meter PKI - Make or Buy? Dr.-Ing. Lutz Martiny achelos GmbH Paderborn Why PKI? Legal Background: Energiewirtschaftsgesetz Technical Background: Technical

More information

ORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS

ORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS ADMINISTRATIONS Effective as of 13 June 2008 Adopted by Decree of the Council of Ministers No 97 of 16 May 2008 Promulgated SG, No. 48 of 23 May 2008 Chapter One GENERAL PROVISIONS Article 1. This Ordinance

More information

AGAINST OUTSIDE THREATS

AGAINST OUTSIDE THREATS SECURING CONTROL NETWORKS AGAINST OUTSIDE THREATS MARK BUCKLAND MAY 2015 2015 Echelon Corporation IzoT PLATFORM PILLARS Full Monitoring and Control over IP Legacy Co-Existence and Evolution Industrial-strength

More information

Mobile Access by Axis. Wireless Access Points

Mobile Access by Axis. Wireless Access Points Mobile Access by Axis Wireless Access Points Mobile Internet: Unleashing the Power of Bluetooth Bluetooth Access Point: Going Beyond Cables There s a revolution taking shape today that s fundamentally

More information

Early Evaluation Center

Early Evaluation Center www.winmedical.com Early Evaluation Center Early Evaluation Center - EEC is an intuitive and easy-to-use software for monitoring and evaluating a patient s clinical risk, and can acquire and process source

More information

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM Jakub Nantl 1 1 Silesian University in Opava, School of Business Administration in Karvina, Univerzitní nám. 1934/3, 733 40 Karviná Email:

More information

The e-payment Systems

The e-payment Systems The e-payment Systems Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing, sales, payment, fulfillment, customer service Electronic

More information

Description of the Technical Component:

Description of the Technical Component: Confirmation concerning Products for Qualified Electronic Signatures according to 15 Sec. 7 S. 1, 17 Sec. 4 German Electronic Signature Act 1 and 11 Sec. 2 and 15 German Electronic Signature Ordinance

More information

Higher National Unit Specification. General information for centres. Unit title: Enhancing Network Security and Configuring Remote Access Methods

Higher National Unit Specification. General information for centres. Unit title: Enhancing Network Security and Configuring Remote Access Methods Higher National Unit Specification General information for centres Unit code: D7JV 35 Unit purpose: This Unit is designed to enable candidates to increase network security through authentication, encryption

More information

mcard CPK Supported Solutions

mcard CPK Supported Solutions mcard CPK Supported Solutions Century Longmai White Paper All rights reserved Contents 1. MTOKEN CPK CARD INTRODUCTION... 2 PRODUCT INTRODUCTION... 2 Product appearance... 3 Hardware parameters... 4 2.

More information

Mobile payment systems

Mobile payment systems ARN, 12. April 2005 Mobile payment systems Agnieszka Zmijewska, Elaine Lawrence, Robert Steele Mobile payments Mobile payments (or m-payments) are payments in which at least one part of the transaction

More information

Operational Aspects (Encryption and Data Storage) in E-Prescription

Operational Aspects (Encryption and Data Storage) in E-Prescription Master of Science in Biomedical Engineering Exam Presentation Medical Informatics Operational Aspects (Encryption and Data Storage) in E-Prescription Thomas Gijs Roel Rynders 12/05/2014 Overview Introduction

More information