Smartcards with Webservice Interface
|
|
- Russell McKinney
- 8 years ago
- Views:
Transcription
1 Smartcards with Webservice Interface 22. SIT-SmartCard Workshop 8./9. February 2012 Jan Eichholz
2 Agenda Benefits of a Webservice Interface for Smartcards The Service Access Layer out of ISO/IEC The Architecture of the G&D Webservice Smartcard Demo Conclusion
3 The Project The German part of the project is funded by the German Federal Ministry of Education and Research Project start: June 2008, February 2009 in Germany Project end: January 2011 National Partners: IFX, NXP European Partners: Gemalto (Project Lead), STM, OKSystem, Precise Biometrics, Compuworx, id3, CEA, NXP-F
4 IT- Infrastructure Vision einer Internet Smart Card Status Quo Networking TCP/IP, USB, HTTP, Bluetooth Operating System Windows, Linux, Palm Devices PCs, PDAs, Phones Applications Internet Smart Card Model Networking TCP/IP, USB, HTTP,.NET, Bluetooth Smart Card Devices PCs, PDAs, Phones Middleware Smart Card T=1 Proprietary JavaCard STARCOS Reader Telco, Payment Corporate ID Operating System Applications Windows, Linux, Palm Source: Dr. Walter Hinz, SIT-SmartCard Workshop Darmstadt, 07. Februar 2007 #4
5 Smartcards with APDU Interface Authentication Identification Data Access Application Interface Application Interface APDU APDU APDU APDU Generation Öffentliche Ordner Öffentliche Ordner
6 Smartcards with Webservice Interface Authentication Identification Data Access Application Interface Application Interface Webservice Öffentliche Ordner
7 Smart Home and M2M Infrastructure Smart Devices Application Server Smart Device Server Secure Data Monitoring JC3.0 Secure Data Smart Home Device Security Gateway Source: Sönke Schröder
8 Agenda Benefits of a Webservice Interface for Smartcards The Service Access Layer out of ISO/IEC The Architecture of the G&D Webservice Smartcard Demo Conclusion
9 ISO/IEC in a nutshell Testing ISO/IEC Architecture ISO/IEC Service Application Service Access Layer (SAL) ISO/IEC Generic Card Access Layer ISO/IEC Interface Device-API (IFD-API) ISO/IEC Auth. Protocols ISO/IEC
10 Agenda Benefits of a Webservice Interface for Smartcards The Service Access Layer out of ISO/IEC The Architecture of the G&D Webservice Smartcard Demo Conclusion
11 G&D SAL-on-card architecture (Overview) APDU TCP/IP based communication Service Access Layer WebService instead of APDU communication Nearly no middleware necessary Simple Card Capability Discovery
12 The Protocol Stack XML / SOAP HTTP / HTTPS Streaming Interface BIP APDU TCP IPv4 / IPv6 EEM (Ethernet) T=0 / T=1 USB
13 JavaCard 3 Connected Servlets (HTTP communication) Multi-Threading Strings Extended APIs Garbage Collection eid-sallet SmartCard SALlet API SAL Servlet XML Parser SOAP Smart Card OS, Web Server Source: Oracle
14 SAL-Servlet: Communication flow On card eid-sallet SmartCard SALlet API SAL Servlet XML Parser SOAP Smart Card OS, Web Server
15 XML & SOAP Extension of the JavaCard API to support XML and SOAP XML & SOAP API according to definitions of Java Standard Edition (subset) Highly optimized with respect to performance, RAM and Flash consumption <env:envelope> <env:header/> <env:body> <CardApplicationConnect> <CardApplicationPath>eID-SALlet</CardApplicationPath> </CardApplicationConnect> </env:body> </env:envelope> SmartCard eid-sallet SALlet API SAL Servlet XML SOAP Parser Smart Card OS, Web Server
16 The SALlet-API Extension to the standard JavaCard API Allows the implementation of Webservice connected Applets (=SALlets) in an easy way Uses the objects out of ISO/IEC Card Applications Differential Identities Data Sets Access Control Lists SmartCard eid-sallet SALlet API SAL Servlet XML SOAP Parser Smart Card OS, Web Server
17 A sample SALlet DIDs and Access Rules //create a PIN-DID object DIDPIN did = new DIDPIN("DIDPIN", 1234, 3); add(did); //create access control list with security condition Vector<Short> actionsdidpin = new Vector<Short>(); actionsdidpin.addelement(action.dsi_read); actionsdidpin.addelement(action.dsi_write); AccessRule accessruledidpin = new AccessRule( new SecurityConditionDID(did), actionsdidpin); //attach access rules to data set dataset.addaccessrule(accessruledidpin); SmartCard eid-sallet SALlet API SAL Servlet XML SOAP Parser Smart Card OS, Web Server
18 Optimization of XML and SOAP Performance time [sec.] ,1 step I step II step III step IV step V step VI step VII step VIII development steps
19 Agenda Benefits of a Webservice Interface for Smartcards The Service Access Layer out of ISO/IEC The Architecture of the G&D Webservice Smartcard Demo Conclusion
20 DEMO
21 Agenda Benefits of a Webservice Interface for Smartcards The Service Access Layer out of ISO/IEC The Architecture of the G&D Webservice Smartcard Demo Conclusion
22 Conclusion The necessary Smartcard infrastructure can be reduced by using an high level interface on the Smartcard With the help of an addition to the JavaCard-API (SALlet-API) the development of SOAP-Applets is quite easy. The Demonstrator shows, that in principal the Webservice as Smartcard interface is possible, but The used JavaCard 3.0 connected platform is currently not mainstream The SOAP-binding is well used, due to specific context an optimized approach might be useful An implementation on top of the widely used JavaCard 3.0 classic platform is possible. IPv6 can offer a direct addressing of the Smartcard in the future, privacy aspects have to be considered!
23 Thank you for your Attention! Contact: Jan Eichholz Phone Giesecke & Devrient GmbH Prinzregentenstr München
Chytré karty opět o rok dál...
Chytré karty opět o rok dál... SmartCardForum 2010 Jan Němec Product expert, Gemalto Květen 2010 Agenda Chytré karty včera, dnes a zítra Úvod do problematiky NFC Integrace NFC do mobilních zařízení Java
More informationISO/IEC 24727 for secure mobile web applications
ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, jan.eichholz@gi-de.com 2 Infineon Technologies AG, detlef.houdeau@infineon.com
More informationUsing ISO/IEC 24727 for mobile devices
Using ISO/IEC 24727 for mobile devices Jan Eichholz, Giesecke & Devrient GmbH Dr. Detlef Hühnlein, secunet Security Networks AG Manuel Bach, Bundesamt für Sicherheit in der Informationstechnik Eichholz/Hühnlein/Bach
More informationDemonstration of Electronic Health Records (EHR) on Java Card 3.0 Technology-Based Devices
BOF-4576 Demonstration of Electronic Health Records (EHR) on Java Card 3.0 Technology-Based Devices Nicolas Anciaux Jean-Jacques Vandewalle Overview Show a real deployment of Java Card 3 devices in the
More informationJava Card. Smartcards. Demos. . p.1/30
. p.1/30 Java Card Smartcards Java Card Demos Smart Cards. p.2/30 . p.3/30 Smartcards Credit-card size piece of plastic with embedded chip, for storing & processing data Standard applications bank cards
More informationSecure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
More informationSIP Protocol as a Communication Bus to Control Embedded Devices
229 SIP Protocol as a Communication Bus to Control Embedded Devices Ramunas DZINDZALIETA Institute of Mathematics and Informatics Akademijos str. 4, Vilnius Lithuania ramunas.dzindzalieta@gmail.com Abstract.
More informationHow To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)
Post-IP technologies virtualization and security Guy Pujolle 1 Virtualization for a post-ip network 2 Geni Intel would like to propose a generic router Intel proposes to have a generic hardware with virtual
More informationLean and Easy Ways to Adopt MOST Technology
Lean and Easy Ways to Adopt MOST Technology Microchip Puts the Synergistic Power of Evolution Right Into Your Hands Harald Kohler, Senior Manager, Business Development & Strategic Marketing Microchip Technology
More informationSEEK project - Access to Secure Elements on Android. Frank Schäfer 04.12.2014
SEEK project - Access to Secure Elements on Android Frank Schäfer 04.12.2014 SEEK: Add Secure Element access to Android n Open Source project, maintained by G&D since 2010 n Implementation of SIMalliance
More informationWhite Paper. Bearer Independent Protocol (BIP)
White Paper Bearer Independent Protocol (BIP) - 2 - Contents 1 Executive summary...4 2 Introduction...5 3 Solution description...5 3.1 Standards compliance...5 3.2 Interface architecture...6 3.3 Data carriers...9
More informationAn NFC Ticketing System with a new approach of an Inverse Reader Mode
An NFC Ticketing System with a new approach of an Inverse Reader Mode Christian Saminger, Stefan Grünberger and Josef Langer NFC University of Applied Sciences Upper Austria 5 th International Workshop
More informationSOSSE. Matthias Brüstle <m@mbsks.franken.de> Simple Operating System for Smartcard Education. Kommunikationsnetz Franken e.v.
Matthias Brüstle Smart Cards mit SOSSE sind lecker 1 SOSSE Simple Operating System for Smartcard Education Matthias Brüstle Kommunikationsnetz Franken e.v. Matthias Brüstle Smart Cards
More informationDetailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
More informationElluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
More informationMaking Sense of Internet of Things Protocols and Implementations
Making Sense of Internet of Things Protocols and Implementations Author: Kim Rowe, RoweBots Higher level protocols for Internet of Things have various features and offer different capabilities. Most of
More informationIntroduction. Interoperability & Tools Group. Existing Network Packet Capture Tools. Challenges for existing tools. Microsoft Message Analyzer
Introduction Interoperability & Tools Group Existing Network Packet Capture Tools Challenges for existing tools Microsoft Message Analyzer Slide 2 Interop and Tools What we do Part of Windows Server Org
More informationBuilding SOA Applications with JAX-WS, JAX- RS, JAXB, and Ajax
Building SOA Applications with JAX-WS, JAX- RS, JAXB, and Ajax Mark Hansen Founder & President, AgileIT mark@agileitinc.com S296157 Learn Powerful Coding Techniques for Building SOA Applications using
More informationRVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment Carolin Latze University of Berne Table of contents > Introduction Smartcards > Deployment Overview Linux Windows
More informationElluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
More informationInternet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
More informationTen Critical Success Factors for Successful Smart Card Projects
Ten Critical Success Factors for Successful Smart Card Projects 2009 Version 1.0 Index 1. Introduction................................................... 4 2.1. Smart Card Profile...........................................
More informationThe OpenEapSmartcard platform. Pr Pascal Urien ENST Paris
The OpenEapSmartcard platform Pr Pascal Urien ENST Paris /20 Pascal URIEN, CARTES 2005, November 16 th 2005 Introduction 1/4: Network ages Analog networks (Tree age) 1876, Alexander Graham Bell invents
More informationCASQUE SNR Presentation 16 th April 2015
Presentation 16 th April 2015 What is it Distributed Management Systems Innovative Methodology from UK owned company with accompanying Protocol that allows Key Generation, Key Distribution and Key Change
More informationAutomatic Configuration and Service Discovery for Networked Smart Devices
Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253
More information3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19
3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server
More informationMobile Application Languages XML, Java, J2ME and JavaCard Lesson 04 Java
Mobile Application Languages XML, Java, J2ME and JavaCard Lesson 04 Java Oxford University Press 2007. All rights reserved. 1 C and C++ C and C++ with in-line-assembly, Visual Basic, and Visual C++ the
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationMobile Operating Systems Lesson 07 Symbian OS
Mobile Operating Systems Lesson 07 Symbian OS Oxford University Press 2007. All rights reserved. 1 Oxford University Press 2007. All rights reserved. 2 Symbian OS multi-modal communication support OS for
More informationApigee Gateway Specifications
Apigee Gateway Specifications Logging and Auditing Data Selection Request/response messages HTTP headers Simple Object Access Protocol (SOAP) headers Custom fragment selection via XPath Data Handling Encryption
More informationA GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS
A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS Lieven Desmet, Bart Jacobs, Frank Piessens, and Wouter Joosen DistriNet Research Group, Katholieke Universiteit
More informationSecurity Guide Release 7.3
[1]Oracle Communications ASAP Security Guide Release 7.3 E61084-01 July 2015 Oracle Communications ASAP Security Guide, Release 7.3 E61084-01 Copyright 2012, 2015, Oracle and/or its affiliates. All rights
More informationSmartcard Web Server Enabler Architecture
Smartcard Web Server Enabler Architecture Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-AD-Smartcard_Web_Server-V1_0-20070209-C OMA-AD-Smartcard_Web_Server-V1_0-20070209-C Page 2 (17) Use
More informationEXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò gpaterno@gpaterno.com June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos
More informationData Integration using Integration Gateway. SAP Mobile Platform 3.0 SP02
Data Integration using Integration Gateway SAP Mobile Platform 3.0 SP02 DOCUMENT ID: DC02000-01-0302-01 LAST REVISED: February 2014 Copyright 2014 by SAP AG or an SAP affiliate company. All rights reserved.
More informationAMHS Interfaces. AMHS Interface Options for Third-party, Non-AMHS Systems
Interfaces COMSOFT GmbH SP/5 - Interface Options for Third-party, Non- Systems /SWIM Workshop and the 7 th Meeting of the Aeronautical Telecommunication Network (ATN) Implementation Co-ordination Group
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More information<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008
Oracle Security Developer Tools (OSDT) August 2008 Items Introduction OSDT 10g Architecture Business Benefits Oracle Products Currently Using OSDT 10g OSDT 10g APIs Description OSDT
More informationni.com Remote Connectivity with LabVIEW
Remote Connectivity with LabVIEW What Is Remote Connectivity? Local Monitoring 3 Remote Mobile Access 4 What Is Remote Connectivity Two machines talking to one another Client Server PC PC Consumes Data
More informationINUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
More informationWireless Java Programming for Enterprise Applications
Wireless Java Programming for Enterprise Applications Mobile Devices Go Corporate Dan Harkey Shan Appajodu Mike Urkin WILEY PUBLISHING, INC. Jl. ^E^.^l.^ Contents Foreword Preface v vii Part 1. Technologies
More informationLead to order integration of CRM on demand and Oracle E-Business Suite. Michael Baggott Dataweave Service Delivery Director
Lead to order integration of CRM on demand and Oracle E-Business Suite Michael Baggott Dataweave Service Delivery Director Agenda About Dataweave About the Project E-Bus Suite AIA PIP integration with
More informationJava Card TM Open Platform for Smart Cards
Java Card TM Open Platform for Smart Cards Wolfgang Effing Giesecke & Devrient GmbH C:\Presentations - JavaCard_OpenPlatform.ppt - ef - 29.04.04 - page 1 What happened in the past? Every company created
More informationLinux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
More informationCRM On Demand. Oracle CRM On Demand CTI Developer s Guide
CRM On Demand Oracle CRM On Demand CTI Developer s Guide Release 19 September 2011 Copyright 2005, 2011 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided
More informationSmart Card Web Server, How to bring operators applications and services to the mass market. February 2009. www.simalliance.
Smart Card Web Server, How to bring operators applications and services to the mass market February 2009 www.simalliance.org - 1 - Executive Summary From the earliest beginnings of mobile communication,
More informationMobile Devices and Web Services
7th WSEAS International Conference on APPLIED COMPUTER SCIENCE, Venice, Italy, November 21-23, 2007 322 Mobile Devices and Web Services TOMAS KOZEL, ANTONIN SLABY Univerzity of Hradec Kralove Department
More informationSalutation Architectures and the newly defined service discovery protocols from Microsoft and Sun
Salutation Architectures and the newly defined service discovery from Microsoft and Sun How does the Salutation Architecture stack up A Salutation White Paper June 6, 1999 Bob Pascoe, Technical Consultant
More informationMobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
More informationAn Open Source eid Simulator Open Identity Summit 9th -11th September 2013
An Open Source eid Simulator Open Identity Summit 9th -11th September 2013 BSI Tobias Senger HJP Consulting Holger Funke Agenda Requirements of BSI Current state Simulator Virtual Smart Card Reader Community
More informationNXP s Solution to ecall Brussels, October 19 th, 2010
NXP s Solution to ecall Brussels, October 19 th, 2010 Agenda The Mission of NXP and its Partners NXP s ecall platform Awareness the Next Step Conclusions NXP leads innovation in Telematics Breakthrough
More informationKURA M2M/IoT Gateway. reducing the distance between embedded and enterprise technologies. Tiziano Modotti, October 28 th, 2014
KURA M2M/IoT Gateway reducing the distance between embedded and enterprise technologies Tiziano Modotti, October 28 th, 2014 IoT Architecture @ M2M/IoT Integration Platform on Cloud Business Applications
More informationSecuring ArcGIS Server Services: First Steps
Federal GIS Conference February 9 10, 2015 Washington, DC Securing ArcGIS Server Services: First Steps Michael Sarhan Esri msarhan@esri.com Agenda Review Basic Security Workflow ArcGIS Server Roles and
More informationIntroduction of Information Security Research Division
Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI
More informationPresent and Act Upon. Register. Consume. Stream Analytics. Event Hubs. Field Gateway. Applications Cloud Gateway. Legacy IoT (custom protocols)
Things Gateway Ingest Transform Store Present and Act Upon Applications Cloud Gateway Event Hubs Stream Analytics Legacy IoT (custom protocols) Register Devices Storage Adapters IP-capable devices (Windows/Linux)
More informationPOINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION
POINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION Executive Summary Enterprise mobility has transformed the way businesses engage with customers, partners and staff while exchanging
More informationZODIANET API (ZAPI2)
ZODIANET API (ZAPI2) ZODIANET API ZAPI 2 Description of information exchange between the Zodianet platform and third-parties Document : specification Source: ZODIANET Mail: support@zodianet.com Revision:
More informationOPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS
OSI OPEN SYSTEMS OSI - Open Systems Interconnection INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS Peter R. Egli INDIGOO.COM 1/8 Contents 1. Layering model 2. The 7 layers
More informationSECURITY AND PRIVACY IN AN ENTERPRISE SEARCH INFRASTRUCTURE FOR MOBILE DEVICES
SECURITY AND PRIVACY IN AN ENTERPRISE SEARCH INFRASTRUCTURE FOR MOBILE DEVICES Christian P. Praher Institute for Information Processing and Microprocessor Technology (FIM) Johannes Kepler University Linz
More informationHome Gateway Enabling Evolution of Network Services
Home Gateway Enabling Evolution of Network Services V Tomohiro Ishihara V Kiyoshi Sukegawa V Hirokazu Shimada (Manuscript received July 3, 2006) Broadband access services have spread rapidly and are now
More informationLoad Balancer Comparison: a quantitative approach. a call for researchers ;)
Load Balancer Comparison: a quantitative approach a call for researchers ;) Complex Internet infrastructure high performance systems clusters grids high availability systems resilient storage resilient
More informationReduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects Fabien Castanier STMicroelectronics IPSO Promoter M2M Forum - Milan, May 20,
More informationBluetooth 4.0 Solutions for Apple ios Devices. Bluegiga Technologies
Bluetooth 4.0 Solutions for Apple ios Devices Bluegiga Technologies Agenda Introduction How to build Bluetooth 4.0 applications Compatible Bluegiga products What is Bluetooth low energy? Summary Introduction
More informationM2M: EE Connectivity. 22 July 2015 2015, EE LIMITED 1
M2M: EE Connectivity 22 July 2015 2015, EE LIMITED 1 EE network and service access Our M2M service gives you access to our mobile network, to facilitate communication between devices and application servers,
More informationJavaCard. Java Card - old vs new
JavaCard 1 Old Smart Cards: One program (applet) Written in machine-code, specific to chip Burned into ROM Java Card - old vs new old vs new smartcards New Smart Cards: Applet written in high-level language
More informationCreating Web Services in NetBeans
Creating Web Services in NetBeans Fulvio Frati fulvio.frati@unimi.it Sesar Lab http://ra.crema.unimi.it 1 Outline Web Services Overview Creation of a Web Services Server Creation of different Web Services
More informationHow To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
More informationesim for consumer devices MWC 2016 Telefonica S.A. Feb. 2016
esim for consumer devices MWC 2016 Telefonica S.A. Feb. 2016 The SIM ensures connectivity & security for users What is a SIM? It s a computer. A SIM has memory, microprocessor, cryptoprocessor, OS, execution
More informationAn innovative, open-standards solution for Konnex interoperability with other domotic middlewares
An innovative, open-standards solution for Konnex interoperability with other domotic middlewares Vittorio Miori, Luca Tarrini, Maurizio Manca, Gabriele Tolomei Italian National Research Council (C.N.R.),
More informationThe Belgian e-id: hacker vs developer
OWASP Belgium Chapter The OWASP Foundation http://www.owasp.org The Belgian e-id: hacker vs developer Erwin Geirnaert ZION SECURITY Frank Cornelis Fedict Agenda The OWASP Foundation http://www.owasp.org
More informationSymbian Operating System
Symbian Operating System 1. Introduction Symbian s Introduction The Smartphone operating system Symbian OS is produced by the software development and licensing company Symbian Ltd. Symbian Ltd was
More informationSmart Cards a(s) Safety Critical Systems
Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas Paradinas@gemplus.com Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business
More informationTel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com. CAIL Security Facility
Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com CAIL Security Facility Table of Contents A. Overview B. CAIL Security Solutions C. Summary
More informationGigaSpaces XAP 10.0 Administration Training ADMINISTRATION, MONITORING AND TROUBLESHOOTING GIGASPACES XAP DISTRIBUTED SYSTEMS
GigaSpaces XAP 10.0 Administration Training ADMINISTRATION, MONITORING AND TROUBLESHOOTING GIGASPACES XAP DISTRIBUTED SYSTEMS Learn about GigaSpaces XAP internal protocols, its configuration, monitoring
More informationDB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
More informationNetworking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the
Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK
More informationMoving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
More informationSmart Card Technology Capabilities
Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards
More informationEclipse Open Healthcare Framework
Eclipse Open Healthcare Framework Eishay Smith [1], James Kaufman [1], Kelvin Jiang [2], Matthew Davis [3], Melih Onvural [4], Ivan Oprencak [5] [1] IBM Almaden Research Center, [2] Columbia University,
More informationSo happy to be here! Paparazzi over IP. Daniel Mende & Pascal Turbing {dmende pturbing}@ernw.de. www.ernw.de
So happy to be here! Paparazzi over IP Daniel Mende & Pascal Turbing {dmende pturbing}@ernw.de 2/18/2013 ERNW GmbH Carl-Bosch-Str. 4 DE-69115 Heidelberg #2 Who we are Old-school network geeks, working
More informationA Generic Database Web Service
A Generic Database Web Service Erdogan Dogdu TOBB Economics and Technology University Computer Engineering Department Ankara, Turkey edogdu@etu.edu.tr Yanchao Wang and Swetha Desetty Georgia State University
More informationNetwork: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
More informationHow To Build A Connector On A Website (For A Nonprogrammer)
Index Data's MasterKey Connect Product Description MasterKey Connect is an innovative technology that makes it easy to automate access to services on the web. It allows nonprogrammers to create 'connectors'
More informationMobile System Technologies Certification Program
Mobile System Technologies Certification Program This is the Mobile Computing Promotion Consortium s (MCPC) official certification program for engineers who wish to obtain deeper knowledge of and experience
More informationTLS/SSL in distributed systems. Eugen Babinciuc
TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History
More informationFundamental Points of the ABScard Technology
Fundamental Points of the ABScard Technology Architettura ABSCARD Pagina 1 di 13 General Index 1.Architecture...3 1.1 Introduction...3 1.1.1 Security...4 1.1.2 Management...5 1.1.3 ABScard enterprise version
More informationIntroduction to E-commerce
i Zheng Qin Introduction to E-commerce With 98 figures Springer Contents Part 1 Fundamentals 1 Fundamentals of E-commerce 3 1.1 The Origin and Development of E-commerce 4 1.1.1 The Origin and Development
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationProduct Release Bulletin
Product Release Bulletin Product: Nexus Personal Version: 4.10 Availability date: 1st February 2009 General information This is a standard, generally available Nexus Personal release. It is available for
More informationDie Zukunft des M-Payment The future of m-payment
Die Zukunft des M-Payment Düsseldorf, 25. Januar 2008 Andreas Johne Agenda Brief company presentation M-payment with Near Field Communication Success stories with Page 2 Giesecke & Devrient From Printing
More informationCEB620MOBILE COMPUTING
CEB620MOBILE COMPUTING UNIT 1 1. What is mobile communication? 2. List out the mobile computing function? 3. What are the mobile computing devices? 4. Define mobile? 5. What is wireless device? 6. List
More informationInteragency Advisory Board Meeting Agenda, Wednesday, February 22, 2012
Interagency Advisory Board Meeting Agenda, Wednesday, February 22, 2012 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Generic Identity Command Set (GICS): Leveraging PIV to Build a Standard Platform
More informationWeb Development with the Eclipse Platform
Web Development with the Eclipse Platform Open Source & Commercial tools for J2EE development Jochen Krause 2004-02-04 Innoopract Agenda Currently available Tools for web development Enhancements in Eclipse
More informationTYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full
More informationSTEP Networks Inc. 1-1385 North routledge Park Ontario, Canada, N6H 5N5 www.stepnetworks.com OUR COMMITMENT TO EXCELLENCE
OUR COMMITMENT TO EXCELLENCE STEP Networks is your source for leading edge Software Development and Consulting Services. Our reputation is builton over 30 years of custom software application development
More informationAdaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering
Adaptive Authentication Integration Options John Murray Manager, RSA Systems Engineering What is RSA Adaptive Authentication? Comprehensive authentication and fraud detection platform Powered by Risk-Based
More informationDatabases Lesson 04 Client Server Computing and Adaptation
Databases Lesson 04 Client Server Computing and Adaptation Oxford University Press 2007. All rights reserved. 1 Two Network Based Computing Architectures Distributed Peer-to-Peer designed each node distributed
More informationPROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES
M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC
More information