International Students Academic Conference 2013 An Approach to a Decentral Mobile Payment System using NFC and the German eid-card

Size: px
Start display at page:

Download "International Students Academic Conference 2013 An Approach to a Decentral Mobile Payment System using NFC and the German eid-card"

Transcription

1 International Students Academic Conference 2013 An Approach to a Decentral Mobile Payment System using NFC and the German eid-card International Students Academic Conference 03/20/2012 Yuanpei University, Taiwan Jan (Yǎ ēn) Essbach, B. Sc. jan.essbach@student.htw-berlin.de

2 1. Introduction Table of Contents 1. Introduction 2. State of the Art 3. Scenarios 4. Decentral Mobile Payment System 5. Evaluation Results 6. Conclusion and Further Work 2

3 1. Introduction The Idea and Scope of Work The Idea Mobile payment framework for all mobile operating systems No third party Easy integration Low transaction costs Scope of Work Evaluation of suitable systems Research relates within Germany, Europe and Japan[14] System should be tested with a concrete application and setup 3

4 1. Introduction Definition of Mobile Payment The term mobile payment describes the type of payments wherein at least the payer uses mobile communication techniques for the three phases of initiation, authorization and realization of the payment [9] (K. Pousttchi) Initiation of payment trough the usage of a mobile device within a mobile application PD Dr. Key Pousttchi, Universität Augsburg 4

5 2. State of the Art Problems of Existing Mobile Payment Solutions Reviewed Mobile Payment Systems[13] PayPal, ClickandBuy, mpass, paysafecard and giropay Offer a great variety of different approaches Results of Review No Near Field Communication (NFC) capability yet No direct integration No framework available Third party is involved High transaction costs 5

6 3. Scenarios 1st Test Case Project Mobile Dinner Project Mobile Dinner (2011) see Julian Volmer Book and pay meal/drinks in a restaurant or bar Payment should be integrated directly into the app Payment had to be cheap according transaction fees to be competitive As a result the payment without usage of third party Authentication via electronic ID-Card[2] using Near Field Communication 6

7 3. Scenarios 2nd Test Case Project htw.sport Planer Project htw.sport Planer (2012) Students book and pay their sports courses via app Same requirements as Mobile Dinner Different Authentication Method Authentication via LDAP using students registration number and password 7

8 4. Decentral Mobile Payment System System Architecture payment 8

9 4. Decentral Mobile Payment System Workflow in Mobile Client Application Pay Cart After Pay Cart is clicked the communication with payment server starts Communication: three phases mentioned in the definition 9

10 4. Decentral Mobile Payment System Concept of Abstract Authentication Support different ways of authentication methods Mobile Dinner (with eid-card) htw.sport Planer (with LDAP) As a result an AbstractAuthenticator was designed Identity Interface holds the information about the user that initiates the payment process Class reference on the right side 10

11 5. Evaluation Results Resulting Solution and Proof of Concept All requirements realized Supporting all mobile operating systems Low transaction costs because of direct realization Possibility of abstract authentication (NFC, LDAP,...) Proof of Concept The system was successfully integrated into the application htw.sport Planer Tested with several bank servers 11

12 6. Conclusion and Further Work Future of the Payment System Supporting other mobile platforms ios and Windows Mobile Only Android is fully implemented Improvements on security Host validation via SSL (to prevent man-in-the-middle attacks) Key-phrase for the FinTS-Datafile has to be encrypted Future of this project Project will be published as open source project on Github in 2013 called imove Mobile Money 12

13 Do you have any questions? Thank you for your attention. 13

14 A. Appendix Literature and Sources [1] DPA. (2011) Prognose: Fast eine Milliarde Smartphones bis [Online].Available: [2] Bundesverbandes deutscher Banken e.v. (2006) FinTS-Spezifikation Version 3.0. [Online].Available: 0.htm [3] K. Finkenzeller, RFID-Handbuch: Grundlagen und praktische Anwendungen von Transpondern, kontaktlosen Chipkarten und NFC, 1st ed. München: Hanser, Carl, [4] EPA. (2011) Statistiken neuer Personalausweis. [Online].Available: node.html [5] M. Hauck. (2010) Mobile Payment süss-sauer. [Online].Available: praesentation.pdf [6] Technische Universität Darmstadt. (2011) MONA - Mobile Usage of the New German eid Card. [Online].Available: [7] S. Online. (2012) Kontaktlose Geldkarte verrät ihren Besitzer. [Online].Available: [8] Google. (2012) Google Wallet - how it works. [Online].Available: [9] K. Pousttchi, Mobile Payment in Deutschland: Szenarienübergreifendes Referenzmodell für mobile Bezahlvorgänge, 1st ed. Wiesbaden: Dt. Univ.-Verl., [10] Apache Software Foundation. (2010) Apache XML-RPC. [Online].Available: [11] A. Christian. (2010) SIMON RPC Software Engineering. [Online].Available: [12] S. Palme. (2010) HBCI4Java - Open-Source HBCI-Client- und Server-Bibliothek für Java. [Online]. Available: [13] J. Essbach. (2012) Mobile Payment - Entwurf und Implementierung einer HBCI-FinTS-Banking Lösung für mobile Geräte. [Online].Available: [14] J. Essbach. (2012) An Approach to a. [Online].Available: 14

How To Create A Mobile Payment System With A Cell Phone And An Eid Card

How To Create A Mobile Payment System With A Cell Phone And An Eid Card The 1 st IEEE International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems 20-21 September 2012, Offenburg, Germany An Approach to a

More information

Cloud Managed Printing

Cloud Managed Printing Cloud Managed Printing Driverless Printing ezeep for desktop is a virtual print driver for Mac and Windows. It enables users to print to any printer right from their desktop applications without the need

More information

Using the owncloud Android App

Using the owncloud Android App Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special

More information

Certifying Energy Efficiency of Android Applications

Certifying Energy Efficiency of Android Applications Proceedings of the 28th EnviroInfo 2014 Conference, Oldenburg, Germany September 10-12, 2014 Certifying Energy Efficiency of Android Applications Johannes Meier 1, Marie-Christin Ostendorp 1, Jan Jelschen

More information

Rocket Mail Smartphone Configuration Guide. Version 2.0

Rocket Mail Smartphone Configuration Guide. Version 2.0 Rocket Mail Smartphone Configuration Guide Version 2.0 Nick Sherman 3/1/2013 Android Configuration 1. From the Applications menu, select Email. This application may be named Mail on some versions of Android.

More information

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption! Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption Thisdocumentcontainsthenecessarystepstoencryptthecontentsofaharddrive usingbitlockerandwindows7. Thefollowinginstructionsarederivedfromdocumentationat:

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

User Guide FOR TOSHIBA STORAGE PLACE

User Guide FOR TOSHIBA STORAGE PLACE User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using

More information

Microsoft Outlook 2013 & 2010. Microsoft Outlook 2007. Microsoft Outlook 2003. Windows Live Mail 2012 & 2011. MAC Mail. Mozilla Thunderbird

Microsoft Outlook 2013 & 2010. Microsoft Outlook 2007. Microsoft Outlook 2003. Windows Live Mail 2012 & 2011. MAC Mail. Mozilla Thunderbird How to configure your WorldPath email address in various mail applications Microsoft Outlook 2013 & 2010 Microsoft Outlook 2007 Microsoft Outlook 2003 Windows Live Mail 2012 & 2011 MAC Mail Mozilla Thunderbird

More information

Breeder documents closing the gap in the identity management chain. Christian Wagner VP SDM Government Washington, March 23, 2015

Breeder documents closing the gap in the identity management chain. Christian Wagner VP SDM Government Washington, March 23, 2015 Breeder documents closing the gap in the identity management chain Christian Wagner VP SDM Government Washington, March 23, 2015 INTERNET OF THINGS IS RISING Five-Year (2014-2019) CAGR 57% 2014, Business

More information

Secure Mail Message Retrieval Instructions

Secure Mail Message Retrieval Instructions 2015 Secure Mail Message Retrieval Instructions IT Security University Medical Center 1/26/2015 Table of Contents INTRODUCTION... 3 REGISTRATION MESSAGES... 3 RETRIEVING THE SECURE EMAIL... 4 SECURE MESSAGE...

More information

Business and enterprise cloud sync, backup and sharing solutions

Business and enterprise cloud sync, backup and sharing solutions Business and enterprise cloud sync, backup and sharing solutions Private Cloud Synchronization Collaboration Backup / Versioning Web Access Mobile Access LDAP / Active Directory Federated RADIUS Single

More information

Cloud Computing mit mathematischen Anwendungen

Cloud Computing mit mathematischen Anwendungen Cloud Computing mit mathematischen Anwendungen Vorlesung SoSe 2009 Dr. Marcel Kunze Karlsruhe Institute of Technology (KIT) Steinbuch Centre for Computing (SCC) KIT the cooperation of Forschungszentrum

More information

Mobile Access Software Blade

Mobile Access Software Blade Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.

More information

ipecs UCS Unified Communications Solution Easy to access and activate Highlights Single server solution

ipecs UCS Unified Communications Solution Easy to access and activate Highlights Single server solution ipecs UCS Unified Communications Solution In today s world of remote and dispersed workers, the ipecs UCS application provides tools to enhance productivity and mobility while improving employee collaboration

More information

You will need your District Google Mail username (e.g. john.doe@palmbeachschools.org) and password to complete the activation process.

You will need your District Google Mail username (e.g. john.doe@palmbeachschools.org) and password to complete the activation process. As a courtesy to the Palm Beach County School District employees, the Division of IT is now providing District Google Mail access for personal mobile devices. Although we do not have the staffing to accept

More information

UNI EMAIL - WINDOWS. How to... Access your University email on your Windows Computer. Introduction. Step 1/1 - Setting Up Your Windows Computer

UNI EMAIL - WINDOWS. How to... Access your University email on your Windows Computer. Introduction. Step 1/1 - Setting Up Your Windows Computer UNIVERSITY EMAIL - WINDOWS How to... Access your University email on your Windows Computer Introduction The University of South Wales offers all enrolled students the use of a free personal e-mail account

More information

brands must be digitally convincing.

brands must be digitally convincing. Online-AgENCY & Software-house We have no doubt. brands must be digitally convincing. The digital era is changing people and markets faster than ever before and is bringing together what belongs together:

More information

Instructions Android Smartphone & Tablet Page 1

Instructions Android Smartphone & Tablet Page 1 Instructions Android Smartphone & Tablet Page 1 Instructions Android Smartphone & Tablet This manual is written for users who already have an e-mail account configured in their Android phone or tablet

More information

Neat Cloud Service + Mobile App

Neat Cloud Service + Mobile App Getting Started with Neat Cloud Service + Mobile App Neat transforms paper and electronic documents into organized digital files that are easy to find, use, and share. Neat Cloud Service and Mobile App

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

Weak Spots in Enterprise Mobility Management Dennis Schröder

Weak Spots in Enterprise Mobility Management Dennis Schröder Weak Spots in Enterprise Mobility Management Dennis Schröder Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dennis Schröder, M. Sc. IT Security Business Security & Privacy Product Manager

More information

Android App for SAP Business One. Z3moB1le App Version 1.00 Pagina 1 di 12. www.z3engineering.it

Android App for SAP Business One. Z3moB1le App Version 1.00 Pagina 1 di 12. www.z3engineering.it Android App for SAP Business One Z3moB1le App Version 1.00 Pagina 1 di 12 Z3 Mobile for SAP Business One (Z3moB1le) Contents Overview... 3 Phone requirements... 3 Available modules... 4 Settings before

More information

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.

More information

Multi-Factor Authentication Job Aide

Multi-Factor Authentication Job Aide To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please

More information

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication

More information

Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität

Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität Dr. Jens Heider Head of Department Testlab Mobile Security Amt für Wirtschaft und Stadtentwicklung,

More information

Payment in E-Commerce Internet Payments from the Perspective of Retailers and Consumers (IZ 2013)

Payment in E-Commerce Internet Payments from the Perspective of Retailers and Consumers (IZ 2013) Payment in E-Commerce Internet Payments from the Perspective of Retailers and Consumers (IZ 2013) A summary of the study by ECC Cologne about the online payment market in collaboration with the Aschaffenburg

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For Email client settings: Incoming Mail (IMAP) Server requires SSL: Outgoing Mail (SMTP) Server requires TLS or SSL: Account Name: Email Address: Password: imap.gmail.com Use SSL: Yes Port: 993 smtp.gmail.com

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

D.I.M. allows different authentication procedures, from simple e-mail confirmation to electronic ID.

D.I.M. allows different authentication procedures, from simple e-mail confirmation to electronic ID. Seite 1 von 11 Distributed Identity Management The intention of Distributed Identity Management is the advancement of the electronic communication infrastructure in justice with the goal of defining open,

More information

MICROSOFT OFFICE 365 MIGRATION 2013/05/13

MICROSOFT OFFICE 365 MIGRATION 2013/05/13 MICROSOFT OFFICE 365 MIGRATION 2013/05/13 WHAT IS OFFICE 365 Office 365 provides virtually anywhere access to familiar Office tools Word WEB App Excel WEB App PowerPoint WEB App Enterprise-grade email

More information

APPLIED AND INTEGRATED SECURITY

APPLIED AND INTEGRATED SECURITY APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München

More information

Q. I use a MAC How do I change my password so I can send and receive my email?

Q. I use a MAC How do I change my password so I can send and receive my email? Password Change FAQ Q. I use a MAC How do I change my password so I can send and receive my email? A. First point a browser to http://www.redlands.edu/passwordmanager and change your password. Afterward,

More information

Privacy Policy (as of 02.2015)

Privacy Policy (as of 02.2015) Privacy Policy (as of 02.2015) We want you to feel secure when visiting our websites, viewing our Online Shop and during all bidding and purchasing processes and their handling, when you engage Auctionata

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

IBM Cognos Mobile Overview

IBM Cognos Mobile Overview IBM Cognos Business Intelligence 10.2.1 IBM Cognos Mobile Overview Agenda IBM Cognos Mobile Overview Analysis on Mobile Security + Configuration Deploying Good Technology Latest Updates IBM Confidential

More information

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com Frequently Asked Questions 2013 SSLPost Page 1 of 31 support@sslpost.com Table of Contents 1 What is SSLPost Cloud? 3 2 Why do I need SSLPost Cloud? 4 3 What do I need to use SSLPost Cloud? 5 4 Which Internet

More information

Keywords: German electronic ID card, e-government and e-business applications, identity management

Keywords: German electronic ID card, e-government and e-business applications, identity management From Student Smartcard Applications to the German Electronic Identity Card Lucie Langer, Axel Schmidt, Alex Wiesmaier Technische Universität Darmstadt, Department of Computer Science, Darmstadt, Germany

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to

More information

$920+ GST Paid Annually. e-commerce Website Hosting Service HOSTING:: WHAT YOU GET WORDPRESS:: THEME + PLUG-IN UPDATES

$920+ GST Paid Annually. e-commerce Website Hosting Service HOSTING:: WHAT YOU GET WORDPRESS:: THEME + PLUG-IN UPDATES e-commerce Website Hosting Service HOSTING:: WHAT YOU GET Where you host your website is an extremely important decision to make, if you choose simply on price, you may be making a huge mistake. We encourage

More information

NOTE: New directions for accessing the Parent Portal using Single Sign On

NOTE: New directions for accessing the Parent Portal using Single Sign On NOTE: New directions for accessing the Parent Portal using Single Sign On PROCESS STEPS SCREEN SHOTS Launch a web browser (Internet Explorer, Safari, or FireFox) and go to PowerSchool Parent Portal URL:

More information

Enter Here -> Directory Submitter Software For One > Visit Here <

Enter Here -> Directory Submitter Software For One > Visit Here < How to add a url to trusted sites in ie, google seo directory submission, word web directory free download. Enter Here -> Directory Submitter Software For One > Visit Here < Buy cheap new instant directory

More information

Guidelines to setup mobile devices to a UOITnet account Google Apps for Education. Information Technology Services

Guidelines to setup mobile devices to a UOITnet account Google Apps for Education. Information Technology Services Guidelines to setup mobile devices to a UOITnet account Google Apps for Education Information Technology Services Contents Support for UOITnet email set up on a Mobile Device... 2 Generate Google Token...

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync

More information

Exchange ActiveSync (EAS)

Exchange ActiveSync (EAS) Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,

More information

IQProtector Mobile Application

IQProtector Mobile Application IQProtector Mobile Application Version 1.1 User Guide Table of Contents Introduction... 2 Supported Versions... 2 Downloading and Installing the Application... 2 Opening a Protected Email... 3 Step 1 Viewing

More information

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab. Outlook Express Open up Outlook Express From the Menu Bar Tools to Accounts - Click on Mail Tab Click on mail.nefcom.net (default) Click on Properties button Click on the General tab User Information E-mail

More information

Mobile Assistant for Monitoring Plant Pests and Diseases

Mobile Assistant for Monitoring Plant Pests and Diseases Mobile Assistant for Monitoring Plant Pests and Diseases Christian Kuhn 1, Juliane Schmitt 1, Manfred Röhrig 2 1 ZEPP Central Institution for Decision Support Systems in Crop Protection Rüdesheimer Str.

More information

Microsoft SQL Server Express 2005 Install Guide

Microsoft SQL Server Express 2005 Install Guide Microsoft SQL Server Express 2005 Install Guide Version 1.1 Page 1 of 32 Contents 1.0 Introduction... 3 1.1 Installing Microsoft SQL Server Express 2005 SP4 Edition... 3 1.2 Installing Microsoft SQL Server

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Send and receive encrypted e-mails

Send and receive encrypted e-mails Manual Send and receive encrypted e-mails Bank J. Safra Sarasin Ltd Document Owner Security Classification Document Type Bank J. Safra Sarasin Ltd internal and external use Manual Document change history

More information

Frequently asked questions

Frequently asked questions Frequently asked questions For more information, visit Usher.com info@ Toll Free (US ONLY): 888.656.4464 Direct Dial: 703.848.8710 1 What is Usher? Usher is a mobile identity platform designed to provide

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution. Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution Global July 2012 Contents Section Slide Numbers Executive Summary 4 Market

More information

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion Initial Setup of Microsoft Outlook Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access Protocol

More information

Manual for Android 1.5

Manual for Android 1.5 Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor

More information

How to use Google Cloud Print

How to use Google Cloud Print How to use Google Cloud Print 1 You can use your Canon printer for Google Cloud Print, following the procedures explained below. In Google Cloud Print, you will be able to print from anywhere you like

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

Mobile Printing for Business Made Easy

Mobile Printing for Business Made Easy Mobile Printing for Business Made Easy If users know how to send an email or go to a Web address, they can print with EveryonePrint EveryonePrint is the perfect fit for any business of any size, where

More information

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt. USC Marshall School of Business Academic Information Services Configuring Outlook 2010 RPC Over HTTP Protocol For Windows 7 Home Computers or Wireless Laptops The steps in this document cover how to configure

More information

Active Repository and Active Migration Manager. Connection to Tamper-Proof Storage Systems. The Architectur. Archiving Policies

Active Repository and Active Migration Manager. Connection to Tamper-Proof Storage Systems. The Architectur. Archiving Policies With the new Active Outlook App it is possible directly from Outlook 2013 or from the Outlook 2013 WebApp to archive emails directly or to outsource to a storage system. Full functionality of archiving

More information

How to set up Outlook Anywhere on your home system

How to set up Outlook Anywhere on your home system How to set up Outlook Anywhere on your home system The Outlook Anywhere feature for Microsoft Exchange Server 2007 allows Microsoft Office Outlook 2007 and Outlook 2003 users to connect to their Outlook

More information

Sicherheitsaspekte des neuen deutschen Personalausweises

Sicherheitsaspekte des neuen deutschen Personalausweises Sicherheitsaspekte des neuen deutschen Personalausweises Dennis Kügler Bundesamt für Sicherheit in der Informationstechnik egov Fokus 2/2013: Identity- und Access Management im E-Government Rethinking

More information

MOBILE DEVICE CONFIGURATION GUIDE ActiveSync

MOBILE DEVICE CONFIGURATION GUIDE ActiveSync MOBILE DEVICE CONFIGURATION GUIDE ActiveSync Contents Configuring Your BlackBerry 10... 3 Configuring Your Windows Phone... 3 Configuring Your Windows Mobile 6.5 (or Prior)... 3 Configuring Android...

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Mobile Healthcare Security Whitepaper

Mobile Healthcare Security Whitepaper Mobile Healthcare Security Whitepaper aycan OsiriX PRO, aycan mobile and Apple's ipad as DICOM image distribution enhancement for PACS environments. Copyright aycan Digitalsysteme GmbH 2013 ayc_mobile_healthcare_security_whitepaper_130529_sp_ds.

More information

UNITED STATES OF AMERICA FEDERAL TRADE COMMISSION

UNITED STATES OF AMERICA FEDERAL TRADE COMMISSION UNITED STATES OF AMERICA FEDERAL TRADE COMMISSION 132 3091 COMMISSIONERS: Edith Ramirez, Chairwoman Julie Brill Maureen K. Ohlhausen Joshua D. Wright ) In the Matter of ) DOCKET NO. ) Credit Karma, Inc.,

More information

Technical Guideline eid-server. Part 2: Security Framework

Technical Guideline eid-server. Part 2: Security Framework Technical Guideline eid-server Part 2: Security Framework BSI TR-03130-2 Version 2.0.1 January 15, 2014 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail:

More information

Apache Milagro (incubating) An Introduction ApacheCon North America

Apache Milagro (incubating) An Introduction ApacheCon North America Apache Milagro (incubating) An Introduction ApacheCon North America Apache Milagro will establish a new independent security framework for the Internet A Distributed Cryptosystem Secure the Future of the

More information

zevent Mobile Application

zevent Mobile Application zevent Mobile Application Dr. Qais Noorshams, IBM DE noorshams@de.ibm.com 15. 18. September @ Zeit für z - z/os Kundentag und GSE z/os Guide in Böblingen The zevent Mobile Application And what about critical

More information

Instructions for Microsoft Outlook 2003

Instructions for Microsoft Outlook 2003 ElkhartNet, Inc. is dedicated to providing our email customers with excellent service and support. In a targeted effort to reduce SPAM and to provide more secure and faster email, we are changing our outgoing

More information

Mobile App Testing. Mobile App Testing. Seite 1 von 10

Mobile App Testing. Mobile App Testing. Seite 1 von 10 Mobile App Testing Seite 1 von 10 1 Security and Insecurity of mobile Applications... 3 1.1 App-Security in official App Stores... 3 1.2 mediatest digital App Security Audits... 3 1.2.1 Testing Approach...

More information

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM) Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email

More information

How to Set Up Your. Email Account

How to Set Up Your. Email Account How to Set Up Your Email Account Contents Outlook 2002 (Office XP)... 3 Outlook 2003 (Office 2003)... 6 Outlook 2007 (Office 2007)... 10 Outlook 2010 (Office 2010)... 14 Outlook Account Setup Page 2 HOW

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Secure service for comfortable cross-enterprise collaboration & data exchange

Secure service for comfortable cross-enterprise collaboration & data exchange Secure service for comfortable cross-enterprise collaboration & data exchange Dr. Ralf Rieken CEO, Uniscon GmbH selected by für die all4cloud Lösung Uniscon at a Glance Founded 2009 (Munich Technology

More information

Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data?

Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data? Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data? Are you aware of the possible consequences of the misuse of your mobile devices? IT S

More information

Two-Step Authentication FAQ

Two-Step Authentication FAQ Two-Step Authentication FAQ General Questions Q: Why is Stanford requiring this additional step? A: Hackers, including foreign state-sponsored entities, are attacking university computer systems with ever-increasing

More information

Teleradiology Security Whitepaper

Teleradiology Security Whitepaper Teleradiology Security Whitepaper aycan telerad as DICOM image distribution enhancement for PACS environments. ayc_telerad_security_whitepaper_150417_sp_ds. ID77905 Copyright aycan Digitalsysteme GmbH

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

White Paper PalmSecure truedentity

White Paper PalmSecure truedentity White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server

More information

Follow these steps to setup your Exchange ActiveSync account to your ios device:

Follow these steps to setup your Exchange ActiveSync account to your ios device: For iphone Follow these steps to setup your Exchange ActiveSync account to your ios device: 1. Tap Settings > Mail, Contacts, Calendars > Add Account > Microsoft Exchange. 2. Enter the information in the

More information

Adding Stronger Authentication to your Portal and Cloud Apps

Adding Stronger Authentication to your Portal and Cloud Apps SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well

More information

HTTP Mutual authentication and Web security

HTTP Mutual authentication and Web security HTTP Mutual authentication and Web security Yutaka OIWA SAAG, IETF 80 Prague Web security Its importance no need to say Transaction security (credit card, PayPal etc.) User data privacy Most online consumer

More information

Two Factor Authentication - USER GUIDE

Two Factor Authentication - USER GUIDE Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.

More information

Frequently Asked Questions About Mobile Banking/Deposit App

Frequently Asked Questions About Mobile Banking/Deposit App Frequently Asked Questions About Mobile Banking/Deposit App What is the myazstcu Mobile App? The myazstcu Mobile App is a service that enables members to access their account information, make deposits,

More information

Session Title: Restaurants and Mobile Commerce

Session Title: Restaurants and Mobile Commerce Session Title: Restaurants and Mobile Commerce Time: Room: Presenter: 2:30pm 3:30pm Maryland Suites, Second Floor Cory Swick - VP of Authentication Solutions Magensa LLC. (A MagTek Company) MagTek Inc./Magensa

More information

PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS

PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS www.openi-ict.eu Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS Open-Source,

More information

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal

More information

Multipurpsoe Business Partner Certificates Guideline for the Business Partner

Multipurpsoe Business Partner Certificates Guideline for the Business Partner Multipurpsoe Business Partner Certificates Guideline for the Business Partner 15.05.2013 Guideline for the Business Partner, V1.3 Document Status Document details Siemens Topic Project name Document type

More information

Set Up E-mail Setup with Microsoft Outlook 2007 using POP3

Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Page 1 of 14 Help Center Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Learn how to configure Outlook 2007 for use with your 1&1 e-mail account using POP3. Before you begin, you will need

More information

CS; SSART-Treffen, November 18, 2015. Internet Banking: Increasing power of cyber crime... and what to do?

CS; SSART-Treffen, November 18, 2015. Internet Banking: Increasing power of cyber crime... and what to do? CS; SSART-Treffen, November 18, 2015 Internet Banking: Increasing power of cyber crime.. and what to do? Different targets for cyber crime Collect large data volumes (financial data) Collect customer related

More information

ZENworks Mobile Management 3.0.x Deployment Quick Start

ZENworks Mobile Management 3.0.x Deployment Quick Start ZENworks Mobile Management 3.0.x Deployment Quick Start September 2014 This Quick Start helps you deploy ZENworks Mobile Management in your environment. It includes the following sections: Install Your

More information

keep your Passwords secure!

keep your Passwords secure! keep your Passwords secure! architectures for secure identity ManageMent: a bottom View Secure Identity Management is is a a key key aspect for corporate security. It It comprises modern technical solutions

More information