Reverse engineering smart cards
|
|
- Quentin Chambers
- 7 years ago
- Views:
Transcription
1 Reverse engineering smart cards Christian M. Amsüss
2 Overview objective understand smart card communication based on sniffable communication hardware standard card reader software something that can talk to the smart card (typically in emulator), cat /dev/usbmon0, some own tools Smart card basics Practical examples
3 Smart card basics Practical examples
4 Common cards and readers
5 Low level shape and contacts defined in ISO and -2 contacts for ground, power, reset, clock, and I/O serial communication ATR: answer to reset (up to 33 byte) protocol T=1 for sending and receiving byte string messages
6 High level 1 > 00 a < > 00 b < command/response dialogue command = APDU, consisting of CLA (usually 00, other values indicate proprietary commands or RFU) INS (instruction, eg. a4 = Select File ) P1, P2 (arguments, eg = Select by DF ) length and data, depending on INS response, consisting of data, depending on INS SW1, SW2 (return code, eg = OK )
7 Interfaces and drivers CCID standard for USB card readers PC/SC Windows API for smart cards PCSC-Lite the same interface on Linux and OS X OpenSC library focused on crypto (PKCS#x), brings some own drivers libchipcard library focused on not blocking unused devices carddecoders my tools and example programs for smart card reverse engineering, based on Python PCSC bindings (
8 Smart card basics Practical examples
9 Trying it out: pcsc-tools pcsc scan (g)scriptor
10 Sniffing on Linux Software that talks to the card can run in a VM (eg. ActiveX applet) Linux lets you sniff USB communication using /dev/usbmon0; output is CCID inside usbmon s binary logging format Workflow: sudo cat /dev/usbmon0 > sniffing run 1.out Do something with the card Stop cat with ^C logdecoder -r sniffing run 1.out (from carddecoders) 1 > 00 a < > 00 b <
11 Interpreting returned data: Encodings Look for numbers known to be read Big Endian: = > 00 a < > 00 b < e 5.32
12 Interpreting returned data: Encodings Look for numbers known to be read Big Endian: = 512 Binary Coded Decimal: = > 00 a f 00 2 < > 00 a < > 00 b < 09 6 f BLZ 12000
13 Interpreting returned data: Encodings Look for numbers known to be read Big Endian: = 512 Binary Coded Decimal: = ASCII: = 1234
14 Interpreting returned data: Encodings Look for numbers known to be read Big Endian: = 512 Binary Coded Decimal: = ASCII: = 1234 Other creative encodings for dates etc. 1 > 00 b < [... ] [... ] 3 > 00 b < [... ] [... ] 5 > 00 b < [... ] [... ] , 10:46 local time (day 5 of the year 010) , 13:31 local time (day 344 of the year 009)
15 Exploring commands Some commands can be bent. 1 > 00 b < 09 6 f According to ISO 7816, the last byte gives the number of bytes to read. Let s assume it works like POSIX s read: 1 > 00 b < 09 6 f [... ] [... ]
16 Exploring commands Some commands can be bent. Others can be bruteforced. 1 > 00 a d f 01 2 < This was known to work... Let s try this: 1 > 00 a d f 08 2 < 6a 00 No... One more? 1 > 00 a d f 09 2 < 6 f a0 00 [... ] f This works, and even sends data immediately.
17 Card state Smart card directory structure: / 3f 00...master file (MF) single file: Read Binary df dedicated file (DF) fixed records: Read Record(n) df variable records: Read Record(n) File selection seems rather safe for experimenting More card state: authentication, challenge/response (limited tries!)
18 Tools provided by carddecoders logdecoder Decodes usbmon output to 1 > 00 a < > 00 b < 09 6 f And generates Python code from it: 1 card. t r a n s m i t ( S e l e c t F i l e ( [ 0 x00, 0 x02 ] ) ) 2 # OK 3 card. t r a n s m i t ( ReadBinary ( l e n g t h =8)) 4 # 09 6 f , OK
19 Tools provided by carddecoders logdecoder carddecoders.reverse helpers Find numbers in various encodings: 1 >>> c o n t a i n s n u m b e r ( B y t e S t r i n g ( f ), 12000) 3 number found i n BCD at o f f s e t 5. 5 b y t e s 4 >>> c o n t a i n s n u m b e r ( B y t e S t r i n g ( f ), 1648) 6 number found i n b i g e n d i a n e ncoding ending 7 at 4. 0 b y t e s Find length indicators: 1 >>> b a c k w a r d l e n g t h ( B y t e S t r i n g ( c 5 f [... ] 5 f ) ) 3 i n d e x 1 : 60 r e m a i n i n g 4 i n d e x 5 9 : 2 r e m a i n i n g
20 Further reading Introduction to Smart Cards Overview over ISO Smartcard protocol sniffing (hardware side)
Smart Card Application Standard Draft
Smart Card Application Standard Draft Contents 1 SCOPE... 6 1.1 DEFINITIONS / DOCUMENT CONVENTIONS... 6 2 KEY DATA ELEMENTS AND CONCEPTS... 7 2.1 STATIC CARD INFORMATION... 7 2.1.1 Card ID (CdID)... 7
More informationFunctional Specification of the OpenPGP application on ISO Smart Card Operating Systems
Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems Version 2.0.1 Author: Achim Pietig 2009 April 22 Author: Achim Pietig Lippstädter Weg 14 32756 Detmold Germany Email:
More informationMDG. MULTOS Developer's Guide. MAO-DOC-TEC-005 v1.40. 2015 MAOSCO Limited. MULTOS is a registered trademark of MULTOS Limited.
MDG MULTOS Developer's Guide MAO-DOC-TEC-005 v1.40 2015 MAOSCO Limited. MULTOS is a registered trademark of MULTOS Limited. MULTOS Developer s Guide Copyright Copyright 1999 2015 MAOSCO Limited. This document
More informationRVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment Carolin Latze University of Berne Table of contents > Introduction Smartcards > Deployment Overview Linux Windows
More informationIntroducing the Adafruit Bluefruit LE Sniffer
Introducing the Adafruit Bluefruit LE Sniffer Created by Kevin Townsend Last updated on 2015-06-25 08:40:07 AM EDT Guide Contents Guide Contents Introduction FTDI Driver Requirements Using the Sniffer
More informationIntroducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
More informationACR122 NFC Contactless Smart Card Reader
Datenblatt / Specifications ACR122 NFC Contactless Smart Card Reader Table of Contents 1. Introduction... 3 1.1. USB Interface... 3 2. Implementation... 4 2.1. Smart Card Reader Interface Overview... 5
More informationUsing PIV Smart Cards on Linux for Authentication to Windows Active Directory
Using PIV Smart Cards on Linux for Authentication to Windows Active Directory Douglas E. Engert Computing and Information Systems April 26, 2006 DOE Cyber Security Group Training Conference Dayton, Ohio
More informationAPPLICATION PROGRAMMING INTERFACE
APPLICATION PROGRAMMING INTERFACE Advanced Card Systems Ltd. Website: www.acs.com.hk Email: info@acs.com.hk Table of Contents 1.0. Introduction... 4 2.0.... 5 2.1. Overview... 5 2.2. Communication Speed...
More informationExercise 1: Set up the Environment
RFID Lab Gildas Avoine, 2014 Contact: gildas.avoine@irisa.fr Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader
More informationSmart Card APDU Analysis
Smart Card APDU Analysis Black Hat Briefings 2008 Las Vegas Ivan "e1" Buetler ivan.buetler@csnc.ch Compass Security AG - Switzerland Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil
More informationAn NFC Ticketing System with a new approach of an Inverse Reader Mode
An NFC Ticketing System with a new approach of an Inverse Reader Mode Christian Saminger, Stefan Grünberger and Josef Langer NFC University of Applied Sciences Upper Austria 5 th International Workshop
More informationMeasurement and Analysis Introduction of ISO7816 (Smart Card)
Measurement and Analysis Introduction of ISO7816 (Smart Card) ISO 7816 is an international standard related to electronic identification cards with contacts, especially smart cards, managed jointly by
More informationHow To Use A Cloud 2700 R Smart Card Reader On A Pc Or Mac Or Ipad (For Microsoft) With A Microsoft Power Card (For Pc) With An Ipad Or Microsoft Memory Card (Microsoft)
Identive Infrastructure Reference Manual version 1.03 Identive CLOUD 2700 R Smart Card Reader Reference manual Identive CLOUD 2700 R Smart Card Reader Identive GmbH Oskar-Messter-Strasse, 13 85737 Ismaning
More informationSmart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment
Smart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment 2009, Raritan Inc. Executive Summary While many organizations have employed
More informationCardWerk SmartCard API (Professional)
auth: Marc Jacquinot date: 02JAN2012 CardWerk Technologies 50 Barrett Parkway, Suite 3005 #412 Marietta, GA 30066 USA support@smartcard-api.com www.smartcard-api.com CardWerk SmartCard API (Professional)
More informationAN2598 Application note
AN2598 Application note Smartcard interface with the STM32F101xx and STM32F103xx Introduction This document describes a firmware and hardware Smartcard interface solution based on the STM32F10xxx USART
More informationSmart Card Technology Capabilities
Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards
More informationEMV (Chip and PIN) Project. EMV card
EMV (Chip and PIN) Project Student: Khuong An Nguyen Supervisor: Professor Chris Mitchell Year: 2009-2010 Full Unit Project EMV card 1 Contents Figures... 6 Tables... 7 1. Introduction... 8 1.1 Electronic
More informationSmart cards basic principles
Smart cards basic principles a. ISO norms ISO7816-X ISO7816-1 specifies the physical characteristics of integrated circuit like the limits to X-rays, UV, electromagnetic field, ambient temperature etc.
More information2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY. Axel Hoffmann
2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY Axel Hoffmann Biography Axel Hoffmann Linux System Administrator 1&1 Mail & Media Dev. & Tech. GmbH axel.hoffmann@1und1.de 2 Introduction Requirements
More informationJavaCard. Java Card - old vs new
JavaCard 1 Old Smart Cards: One program (applet) Written in machine-code, specific to chip Burned into ROM Java Card - old vs new old vs new smartcards New Smart Cards: Applet written in high-level language
More informationSIM CARD PROTOCOLS. This paper attempts in broad strokes to outline the construction of these protocols and how they are used.
SIM CARD PROTOCOLS Though rarely thought about by most users their mobile phone contains a remarkable computing device that enables them to go about their business of making calls, text messaging or playing
More informationMUSCLE Cryptographic Card Edge Definition for Java 1 Enabled Smartcards
MUSCLE Cryptographic Card Edge Definition for Java 1 Enabled Smartcards David Corcoran Tommaso Cucinotta This document is provided on an as-is basis. Neither the authors nor the MUSCLE project are responsible
More informationMifare DESFire Specification
Mifare DESFire Specification Version 1.0 29 th September 2009 Revision History Version Date Author Description of Changes 1.0 29/09/09 O McLaughlin Ratified by LASSeO 0.2 28/07/09 O McLaughlin Minor changes
More informationCHAPTER 5 SMART CARD TECHNOLOGY
56 CHAPTER 5 SMART CARD TECHNOLOGY 5.1 INTRODUCTION Today's society is often illustrated as an information society. Technological developments, particularly in the areas of computers and telecommunications
More informationJava Card. Smartcards. Demos. . p.1/30
. p.1/30 Java Card Smartcards Java Card Demos Smart Cards. p.2/30 . p.3/30 Smartcards Credit-card size piece of plastic with embedded chip, for storing & processing data Standard applications bank cards
More informationGovernment Smart Card Interoperability Specification
Interagency Report 6887-2003 Edition Government Smart Card Interoperability Specification Version 2.1 Teresa Schwarzhoff Jim Dray John Wack Eric Dalci Alan Goldfine Michaela Iorga July 16, 2003 NIST Interagency
More information73S1215F, 73S1217F Device Firmware Upgrade Host Driver/Application Development User s Guide April 27, 2009 Rev. 1.00 UG_12xxF_029
Simplifying System Integration TM 73S1215F, 73S1217F Device Firmware Upgrade Host Driver/Application Development User s Guide April 27, 2009 Rev. 1.00 UG_12xxF_029 73S1215, 73S1217F DFU Host Driver/Application
More informationUniversal Serial Bus. Device Class: Smart Card CCID. Specification for Integrated Circuit(s) Cards Interface Devices
Universal Serial Bus Device Class: Smart Card CCID Specification for Integrated Circuit(s) Cards Interface Devices Revision 1.1 April 22 rd, 2005 CCID Rev 1.1 Page 1 of 123 Intellectual Property Disclaimer
More informationEMV (Chip-and-PIN) Protocol
EMV (Chip-and-PIN) Protocol Märt Bakhoff December 15, 2014 Abstract The objective of this report is to observe and describe a real world online transaction made between a debit card issued by an Estonian
More informationAN2284 APPLICATION NOTE
APPLICATION NOTE Smart Card Interface with the STR71xx Introduction This document describes a software and hardware smart card interface for the STR71x Smart Card peripheral. The main purpose of this software
More informationInstalling Java (Windows) and Writing your First Program
Appendix Installing Java (Windows) and Writing your First Program We will be running Java from the command line and writing Java code in Notepad++ (or similar). The first step is to ensure you have installed
More informationSmart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER Table of Contents.... About This Paper.... 3 Introduction... 3 Smart Card Overview.... 3 Getting Started... 4 Authenticating
More informationSOSSE. Matthias Brüstle <m@mbsks.franken.de> Simple Operating System for Smartcard Education. Kommunikationsnetz Franken e.v.
Matthias Brüstle Smart Cards mit SOSSE sind lecker 1 SOSSE Simple Operating System for Smartcard Education Matthias Brüstle Kommunikationsnetz Franken e.v. Matthias Brüstle Smart Cards
More informationYubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015
YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,
More informationTechnical Terms and Conditions
I. Services: These Technical Terms and Conditions relate to the following services: MojeBanka, MojeBanka Business and MojePlatba for the shopper, Přímý kanál an add-on for the MojeBanka Business service,
More informationSmart Card HOWTO. Tolga KILIÇLI. tolga@deepnight.org. Copyright 2001 by Tolga KILIÇLI
Smart Card HOWTO Tolga KILIÇLI tolga@deepnight.org Copyright 2001 by Tolga KILIÇLI Revision History Revision 1.0.4 2001 09 19 Revised by: tk This is the first release of Smart Card HOWTO. This document
More informationGetting to know your card: Reverse-Engineering the Smart-Card Application Protocol Data Unit for PKCS#11 Functions
: Reverse-Engineering the Smart-Card Application Protocol Data Unit for PKCS#11 Functions 1, Fiona McNeill 2, Alan Bundy 1, Graham Steel 3 Riccardo Focardi 4, Claudio Bozzato 4 1 University of Edinburgh
More informationAdvanced Authentication
Architecture Overview Authasas Advanced Authentication Strong Authenticating to Novell edirectory using Domain Services for Windows November, 2011 Authasas Advanced Authentication Asterweg 19D12 1031 HL
More informationAN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev. 1.3 2 October 2012 130513. Document information
MIFARE Classic as NFC Type MIFARE Classic Tag Document information Info Content Keywords NFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type
More informationjcardsim Java Card is simple!
JavaOne Moscow, 2013 jcardsim Java Card is simple! Mikhail Dudarev, CTO of jcardsim.org Brief history of Java Card Basics standards How is that works? Developer Tools Writing our first real life Java Card
More informationOPERATING SYSTEM SERVICES
OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered
More informationApplication Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
More informationCrash Dive into Python
ECPE 170 University of the Pacific Crash Dive into Python 2 Lab Schedule Ac:vi:es Assignments Due Today Lab 11 Network Programming Due by Dec 1 st 5:00am Python Lab 12 Next Week Due by Dec 8 th 5:00am
More informationHow To Run A Password Manager On A 32 Bit Computer (For 64 Bit) On A 64 Bit Computer With A Password Logger (For 32 Bit) (For Linux) ( For 64 Bit (Foramd64) (Amd64 (For Pc
SafeNet Authentication Client (Linux) Administrator s Guide Version 8.1 Revision A Copyright 2011, SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document
More informationSEEK project - Access to Secure Elements on Android. Frank Schäfer 04.12.2014
SEEK project - Access to Secure Elements on Android Frank Schäfer 04.12.2014 SEEK: Add Secure Element access to Android n Open Source project, maintained by G&D since 2010 n Implementation of SIMalliance
More informationServices and Data Definitions
Version: 2.0 29 th September 2009 Bracknell Forest Borough Council Revision History Version Date Author Description of Changes 2.0 290909 O McLaughlin Ratified by LASSeO 1.3 130709 O McLaughlin Addition
More informationRPLIDAR. Low Cost 360 degree 2D Laser Scanner (LIDAR) System Development Kit User Manual. 2014-2 Rev.1
RPLIDAR Low Cost 360 degree 2D Laser Scanner (LIDAR) Development Kit User Manual 2014-2 Rev.1 Team Contents: 1. OVERVIEW... 2 ITEMS IN DEVELOPMENT KIT... 2 RPLIDAR... 2 USB ADAPTER... 3 2. CONNECTION AND
More informationEXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò gpaterno@gpaterno.com June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos
More informationLeveraging the Android Accessory Protocol
Leveraging the Android Accessory Protocol Gary Bisson Adeneo Embedded gbisson@adeneo-embedded.com Android Builders Summit 2013 1 Session Overview Introduction to Android Open Accessory Protocol specifications
More informationModbus and ION Technology
70072-0104-14 TECHNICAL 06/2009 Modbus and ION Technology Modicon Modbus is a communications protocol widely used in process control industries such as manufacturing. PowerLogic ION meters are compatible
More informationNEO Manager Quick Start Guide
NEO Manager Quick Start Guide For the YubiKey NEO and NEO-n Version 1.1 November 19, 2014 NEO Manager Quick Start Guide 2014 Yubico. All rights reserved. Page 1 of 6 About Yubico Disclaimer As the inventors
More informationBLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE
BLUETOOTH SERIAL PORT PROFILE iwrap APPLICATION NOTE Thursday, 19 April 2012 Version 1.2 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for
More informationJava Applet and Terminal Application for Financial transactions
Java Applet and Terminal Application for Financial transactions Security for Java and E-commerce Environment Behrooz Aghakhanian baf@kth.se Jalil Shokouh shokouh@kth.se May 2011 Introduction In this assignment
More informationSmart Card. Smart Card applications
Smart Card Chip Plastic card A very secure way of storing a small amount of sensitive data 1 Smart Card applications Retail Sale of goods using Electronic Purses, Credit / Debit Vending machines Loyalty
More informationSupverVAG K+CAN User Manual
SupverVAG K+CAN User Manual Introduction This product is an integrated maintenance tools for series of VAG cars, and it can help complete the repairs quickly transfer sheet, anti-theft code reading, key
More informationHP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Application Setup help topics for printing
HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Application Setup help topics for printing Document Release Date: December 2014 Software Release Date: December
More informationOpen Mobile API Test Specification for Transport API
Open Mobile Test Specification for Transport V1 Copyright 2014 SIMalliance ltd. The information contained in this document may be used, disclosed and reproduced without the prior written authorization
More informationTT-RFID platform - Introduction
TT-RFID platform - Introduction Version 0.7 01/06/2011 INDEX 1. RFID PROTOCOL - MAIN FEATURES...1 2. COMMAND DISPLAY FOR THE RFID PROTOCOL...2 3. GUIDELINES FOR USING THE RFID PROTOCOL... 4 3.1. CONFIGURATION
More informationSmart Cards a(s) Safety Critical Systems
Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas Paradinas@gemplus.com Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business
More informationUsing RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
More informationACR122U USB NFC Reader
ACR122U USB NFC Reader Application Programming Interface V2.02 Subject to change without prior notice Table of Contents 1.0. Introduction... 4 1.1. Features... 4 1.2. USB Interface... 5 2.0. Implementation...
More informationSPROG DCC Decoder Programmer
SPROG DCC Decoder Programmer Operating Manual Firmware Version 3.4 April 2004 2004 Andrew Crosland web: http://www.sheerstock.fsnet.co.uk/dcc/sprog e-mail: dcc@sheerstock.fsnet.co.uk Disclaimer You build,
More informationKerberos: Single Sign On for BS2000
Kerberos: Single Sign On for BS2000 Issue April 2011 Pages 6 Overview A Single Sign On system (SSO system) is a system which permits an automatic and convenient, i.e. nonrecurring, logon to various resources
More informationAn Open Source eid Simulator Open Identity Summit 9th -11th September 2013
An Open Source eid Simulator Open Identity Summit 9th -11th September 2013 BSI Tobias Senger HJP Consulting Holger Funke Agenda Requirements of BSI Current state Simulator Virtual Smart Card Reader Community
More informationHacking Mifare Classic Cards. Márcio Almeida (marcioalma@gmail.com)
Hacking Mifare Classic Cards Márcio Almeida (marcioalma@gmail.com) !! DISCLAIMERS!! Disclaimer 1: The content of this presentation results from independent research conducted by me on my own time and of
More informationENTTEC Pixie Driver API Specification
ENTTEC Pixie Driver API Specification Purpose This document specifies the interface requirements for PC based application programs to use the ENTTEC Pixie Driver board to drive RGB or RGBW type LED strips.
More informationUser Manual. SmartWi Toolbox. Date: 2008-07-07. Version: 1.00. Firmware: 2.43 ->
SmartWi User Manual Date: 2008-07-07 Version: 1.00 Firmware: 2.43 -> The software SmartWi is intended for upgrading, configuring and monitoring your SmartWi Multi Room Solution. Note: Please close any
More informationDriver Installation and Hyperterminal Operation of iload Digital USB Sensors
Driver Installation and Hyperterminal Operation of iload Digital USB Sensors Driver Installation Insert the iload Digital USB Driver CD OR the LoadVUE or LoadVUE Lite CD into your computer s drive. If
More informationThe Advanced JTAG Bridge. Nathan Yawn nathan.yawn@opencores.org 05/12/09
The Advanced JTAG Bridge Nathan Yawn nathan.yawn@opencores.org 05/12/09 Copyright (C) 2008-2009 Nathan Yawn Permission is granted to copy, distribute and/or modify this document under the terms of the
More informationSecurity Classification: EIDA ID Card Toolkit v2.7. Developer s Guide
Security Classification: EIDA ID Card Toolkit v2.7 Developer s Guide Organization Document Title Date 31-10-2012 Doc Name / Ref Classification Document Type Document Details Emirates Identity Authority
More informationGlobal network of innovation. Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway)
Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway) Agenda Security Portfolio intro Why SmartCard? SmartCard Applications SmartCard Solution Components
More informationNetwork Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
More informationSIMtrace Usermanual i. SIMtrace Usermanual
i SIMtrace Usermanual ii Copyright 2011-2012 This work is licensed under a Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/3.0/
More informationDevelopment of complex KNX Devices
WEINZIERL ENGINEERING GmbH WEINZIERL ENGINEERING GMBH Jason Richards 84558 Tyrlaching GERMANY Phone +49 (0) 8623 / 987 98-03 Web: www.weinzierl.de Development of complex KNX Devices Abstract The KNX World
More informationSLE66CX322P or SLE66CX642P / CardOS V4.2B FIPS with Application for Digital Signature
Security Confirmation and Report T-Systems.02192.TE.08.2007 SLE66CX322P or SLE66CX642P / CardOS V4.2B FIPS with Application for Digital Signature Siemens AG Confirmation concerning Products for Qualified
More information3GPP TS 31.103 V5.13.1 (2007-06)
TS 31.103 V5.13.1 (2007-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Characteristics of the IP Multimedia Services Identity
More informationSmart Card Setup Guide
Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of
More informationProx DU & Prox SU. Dual interface USB smart card reader. Installation Guide. Installation Guide. Prox DU & Prox SU. DOC118570D Public Use Page 1/34
Dual interface USB smart card reader Installation Guide DOC118570D Public Use Page 1/34 All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or
More information1. Product Overview 2. Product Feature 3. Product Value 4. Development Environment 5. Software Development Kit 6. Product Application 7.
www.acs.com.hk 1. Product Overview 2. Product Feature 3. Product Value 4. Development Environment 5. Software Development Kit 6. Product Application 7. Product Roadmap 8. Q & A 2 3 ACR88 Handheld Smart
More informationFunctional Specification of the OpenPGP application on ISO Smart Card Operating Systems. Version 3.0.1 Author: Achim Pietig
Functional pecification of the on IO mart Card Operating ystems Author: Achim Pietig June 30 Author: Achim Pietig Lippstädter Weg 14 32756 Detmold Germany Email: openpgp@pietig.com This document and translations
More informationSCM Microsystems. Reference Manual version 1.3. SCL010 Multiprotocol contactless stationary reader
SCM Microsystems Reference Manual version 1.3 SCL010 Multiprotocol contactless stationary reader Reference manual SCL010 Multiprotocol Contactless Stationary Reader SCM Microsystems Oskar-Messter-Strasse,
More informationPMOD Installation on Linux Systems
User's Guide PMOD Installation on Linux Systems Version 3.7 PMOD Technologies Linux Installation The installation for all types of PMOD systems starts with the software extraction from the installation
More informationThe SmartLogic Tool: Analysing and Testing Smart Card Protocols
The SmartLogic Tool: Analysing and Testing Smart Card Protocols Gerhard de Koning Gans, Joeri de Ruiter Digital Security, Radboud University Nijmegen The SmartLogic Tool A tool to analyse, emulate and
More informationDeploying a Virtual Machine (Instance) using a Template via CloudStack UI in v4.5.x (procedure valid until Oct 2015)
Deploying a Virtual Machine (Instance) using a Template via CloudStack UI in v4.5.x (procedure valid until Oct 2015) Access CloudStack web interface via: Internal access links: http://cloudstack.doc.ic.ac.uk
More informationHow do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself
How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,
More informationOverview of Data Security Methods: Passwords, Encryption, and Erase
Overview of Data Security Methods: Passwords, Encryption, and Erase Chris Budd SMART High Reliability Solutions Santa Clara, CA 1 Overview of Data Security Methods Introduction Data Protection Passwords
More informationDriver s License Camera Scanner Installation Guide!
Driver s License Camera Scanner Installation Guide 1831 Fort Union Blvd, Salt Lake City, Utah 84121 800-347-6439 801-943-7277 www.companioncorp.com Copyright 2013 Evelyn Manufacturing, All Rights Reserved.
More informationEC313 - VHDL State Machine Example
EC313 - VHDL State Machine Example One of the best ways to learn how to code is seeing a working example. Below is an example of a Roulette Table Wheel. Essentially Roulette is a game that selects a random
More informationTera Term Telnet. Introduction
Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start
More informationJava Card TM Open Platform for Smart Cards
Java Card TM Open Platform for Smart Cards Wolfgang Effing Giesecke & Devrient GmbH C:\Presentations - JavaCard_OpenPlatform.ppt - ef - 29.04.04 - page 1 What happened in the past? Every company created
More informationApache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
More informationANZ TRANSACTIVE GETTING STARTED GUIDE AUSTRALIA & NEW ZEALAND
ANZ TRANSACTIVE GETTING STARTED GUIDE AUSTRALIA & NEW ZEALAND TRANS-TASMAN 11.2015 Simplifying and connecting your transaction banking across Australia and New Zealand DISCLAIMER > > References to Australia(n)
More informationETSI TS 102 484 V8.1.0 (2010-10) Technical Specification. Smart Cards; Secure channel between a UICC and an end-point terminal (Release 8)
TS 102 484 V8.1.0 (2010-10) Technical Specification Smart Cards; Secure channel between a UICC and an end-point terminal (Release 8) 2 TS 102 484 V8.1.0 (2010-10) Reference RTS/SCP-T0312v810 Keywords security,
More informationTable of Contents. User s guide 2
CryptoPlus KB Version 1.1.46 USER S GUIDE November 2009 Table of Contents Table of Contents...2 1 Introduction...3 2 CryptoPlus How to Start...3 2.1 HW and SW requirements...3 2.2 Licence covenants and
More informationStrong Authentication in details
Strong Authentication in details Kuznetsov Alexander Technical Account Manager VASCO Core Activities Overview DIGIPASS DIGIPASS Go Range DIGIPASS E-signature DIGIPASS Reader DIGIPASS for Mobile DIGIPASS
More informationAgent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents
Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)
More informationNew Technology Introduction: Android Studio with PushBot
FIRST Tech Challenge New Technology Introduction: Android Studio with PushBot Carol Chiang, Stephen O Keefe 12 September 2015 Overview Android Studio What is it? Android Studio system requirements Android
More informationSecure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
More information