Tax Control and Security of M-Commerce in 3G Environments. ZheJiang WanLi University

Size: px
Start display at page:

Download "Tax Control and Security of M-Commerce in 3G Environments. ZheJiang WanLi University pantiejunmail@126.com"

Transcription

1

2 Tax Control and Security of M-Commerce in 3G Environments PAN Tie-Jun, ZHENG Lei-na, BAI Lingbing ZheJiang WanLi University Abstract This paper seeks to integrate different impressive access technologies to build a kind of innovative M Commerce tax control and security model. It analyzes the key problem of M-Commerce in the age of the 3rd generation wireless communication infrastructure (3G), present a set of mobile tax control and security solution in which the second generation ID card in China is used instead of all kinds of the existing IC or ID card for identification and mutual authentication through Radio Frequency Identification (RFID) access technology with mobile terminal, T-FLASH (TF) card is used for tax control and security junctions of mobile business through SD Input/ Output (SDIO) access technology. K-java is used for cross platform and Web Service is used for system integration base on Open Service Architecture (OSA) according to 3GPP. Then mobile tax control and security mechanisms are given including key enabling technologies, system integration solution, and implement method. In the end, software and hardware design is introduced and a practical application is given. The result of the present work implied that the integration of SIM card and tax control card is gradually becoming a new research field which is a competitive technology and will be used in the mobile business solution. 1. Introduction With the increasing combination of information technology and mobile technologies, mobile commerce has become the hot topic of broad areas of the mobile Internet. The user has the strong demand for mobile commerce at any time, place, which can be realized by the combination of mobile communications services providers and the financial services providers. 3G (The Third-Generation Communication System) will lead to vigorous development of mobile commerce presents a "blowout" phenomenon in China. The wireless resources are rich in Overseas for 3G network set up earlier. As early as 2004, the Japanese mobile phone users can take advantage of free on-line store to select and pay for goods. NTTDoCoMo Company has more than 3 million mobile wallet users who can arbitrarily purchase using mobile phone payment in stores and vending machines in Japan in In South Korea, a growing number of mobile phone users use mobile POS payment, apply for financial business, buying a bus and subway tickets via phone. In the United States, Britain, Germany, Finland, Sweden and other countries have already successfully launched the "mobile commerce system," mobile commerce using mobile phones. [1] However, in the course of the implementation of mobile commerce, security becomes a key bottleneck. Because the phone's encryption capabilities are limited which cannot meet the financial security requirements well, the majority of mobile commerce is currently limited to small or directed the payment which cannot achieve the high-security Internet e-commerce security level. At the same time, due to rampant cell phone virus attacks and new technologies emerge, the security solution simply relying on software security and mobile phone itself has also withstood a severe test, which is the mobile commerce have to face the reality of the serious and growing problem e at home and abroad. In addition, 95% of annual revenue comes from taxes, with the mobile commerce transaction volume is showing explosive growth, how to achieve taxpayer automation, tax collection and management information, strengthen the monitoring of tax sources to ensure stability and security of tax revenue to become an urgent need to solve the problem [3].. 2. Mobile business solution This paper proposes a new mobile business solution, it will not change the phone's any hardware configuration, just use several interface technology to optimize the allocation of existing resources and achieve innovative model of a mobile commerce applications. It contains several key enabling technologies as follows: 2.1. Mobile business information security framework based on 3G To develop mobile commerce vigorously, mobile information should first solve the security issues. In this paper, According to the 3GPP specification and the OSA (Open Service Architecture) service layer model, the security features of identity and identification of the user (lmsi / TMSI / EUIC), AKA (Authority and Key Agreement: Authentication and Key Agreement), DI /10/$ IEEE 83

3 (Data Integrity: Data integrity protection), DC (Data Confidentiality: data confidentiality protection) and certification information in the conversion between the different certified network, will be packaged into a hardware-based encryption driver at the application layer, 3 GPP-defined core algorithm and the concrete implementation are provided in the form of API including: AKA in fl, fl, f3, f4, f5, fl * and f5 *, EUIC the f6 and fl, data encryption algorithm f8, and data integrity algorithm f9. [4] In order to being compatible with 3G mobile commerce, and facilitating the existing software-based encryption to transform to the hardware encryption, it is necessary to packaged the hardware encryption into a standard function interface or message interface for redevelopment. Due to the rampant cell phone virus, mobile commerce hardware encryption security solutions is becoming a hot research, this paper will propose a hardware-based encryption solution with SDIO interface. Now smart phones are generally equipped with SDIO card interface. SDIO allows manufacturers to develop product expansion by adding hardware in the SDIO compatible slot. Many additional products based on the SDIO are development, including mobile commerce electronic key. SDIO compatible slots are available for many PDA and mobile phones, and plans to encryption devices for mobile commerce. Tax Machine commonly use EPROM as tax- memory module to record tax control data for the completion of tax control function so that the encryption system easy to crack, resulting in tax losses. We proposes mobile phone implementing Tax Machine function with 32-bit high-performance central processing unit and SD tax control card by a machine a card, will be seamless method of upgrading mobile phone into a Tax Machine without changing any hardware configuration for mobile commerce Cross-platform application integration based on K-javalWeb Service Mobile payment application development technologies such as SMS, STK, GSM / GPRS, GSM / USSD, WAP, K-JA V A, CDMAIBREW, have their own advantages and disadvantages, how to segment their business for the different user groups to provide cost-effective, userfriendly interactive directly related to the success or failure of mobile commerce. K-JA VA middleware technology based on Web Service could be good compatible with various types of terminals, and could be a very good agreement with the 3GPP TS compliant. It will be enormous pressure on the server side owing to a large amount of mobile business user access and multi-concurrency. How to handle a large number of services access and improve the quality and stability of the mobile commerce may become the bottleneck problem. We adopted SOA Framework technology which mobile commerce functionality is packaged as EJB3.0 components deployed to JBOSS application server, mobile phone client access mobile commerce functionality through Web Service components at the application layer. ESB technology makes it possible to integrate different mobile commerce services developed by different languages in the legacy applications, as shown in Figure 1. Figure 1. Application integration using ESB In order to being compatible with 3G mobile commerce, and facilitating the existing software-based encryption to transform to the hardware encryption, it is necessary to packaged the hardware encryption into a standard function interface or message interface for redevelopment. Due to the rampant cell phone virus, mobile commerce hardware encryption security solutions is becoming a hot research, this paper will propose a hardware-based encryption solution with SDIO interface. Now smart phones are generally equipped with SDIO card interface. SDIO allows manufacturers to develop product expansion by adding hardware in the SDIO compatible slot. Many additional products based on the SDIO are development, including mobile commerce electronic key. SDIO compatible slots are available for many PDA and mobile phones, and plans to encryption devices for mobile commerce. Tax Machine commonly use EPROM as tax- memory module to record tax control data for the completion of tax control function so that the encryption system easy to crack, resulting in tax losses. We proposes mobile phone implementing Tax Machine function with 32-bit high-performance central processing unit and SD tax control card by a machine a card, will be seamless method of upgrading mobile phone into a Tax Machine without changing any hardware configuration for mobile commerce. 84

4 3. M-Commerce System Design 3.1. Principle of Fiscal Cash Register Currently the differenence between ordinary Electronic Cash Register and Fiscal Cash Register in the market is that the later is generally composed of IC card reader module, tax-memory, and invoice-memory. Fiscal Cash Register includes the user IC card and tax control IC card for the tax data generation, transmission and management. The user IC card is used for tax data transmission between Fiscal Cash Register and the corresponding tax control POS management systems: In the specified date, the taxpayer complete the appropriate safety certification to Fiscal Cash Register using the user IC card and tax control IC card, collect tax data (stored in a tax-memory), invoices data (stored in the invoice memory), etc., send the data to the tax authorities' Fiscal Cash management system, the tax authorities return information to Fiscal Cash Register and tax control IC card by the user IC card. Tax control IC card is used to control tax-data, to identify the identity of Fiscal Cash Register, mutual authentication of the user IC card and tax administration system, to store user information and to ensure that data is not tampered with tax control, to generate Invoice Tax Code and Tax data transmission electronic signatures. With the introduction of the national standard GB and national series of principles and policy formulation, promotion and application of Fiscal Cash Register is entering a stage of rapid development. But due to use of smart cards as a medium, a user has to hold a user IC card to the tax administration which is often not convenient enough, sometimes will also affect the user's work under special circumstances. In January 9, 2008, China's invention patent (No ) disclosed a built-in tax control machine which proposed to embed tax control machine into Pc. The solution is not only complex, high cost, and cannot meet the user's mobile business needs. With the rapid development of mobile communication technology, mobile terminals (mobile phones, PDA, etc.) has gradually become a personal business platform, a large number of small businesses have mobile phones, they have strong desire to transform the phone into a mobile POS which bring mobile commerce tax control a pressing issue. communicating with the administration console and the security module setting in the mobile phone, it also includes mobile phone installed with the implementation for the tax-data input / output operations and the liaison unit, which is to contact the device including credit card, printing equipment via the data communication interface, such as data lines, non-contact IC card, IrDA, Bluetooth, RFID, NFC and USB device control interface. Mobile commerce business processes using Fiscal Cash Register is designed as follows: CD Tax system is a front-end of tax administration system which can be installed and to be updated on the smart mobile phones by the way of OT A Tax system provides friendly interface through the smart phone display for the operator, receiving commerce data and control information from the smart phone's keypad and credit card equipment, and provides customers the transaction information through smart phone Tax system pass the invoice information and the sale of commodity information to the tax control IC card, receive generated encryption key in accordance with the invoice information and the sale of goods to generate invoice data which is stored on the invoice memory for the printer to print invoices; Tax system generate tax control data based on transaction data, reporting data and single volume invoice data stored in the tax-memory. At the same time, it stores report data and invoices data on the user IC card and read monitoring data from the user IC system support remote tax returns, the daily management for back-end server, commodity information uploading and downloading by connecting the network communication control interface. [5] 3.3. Implement Project In actual use, the communication devices can also choose mobile phones, portable computers, PC or PDA, security module can be a SIM with security feature or IC card with TF (T-FLASH) card interface. The solution for mobile phones and IC card with the TF card interface is shown in Figure Operate Process This solution is to provide a simple and easy way to operate tax control for mobile commerce which can greatly facilitate the user's needs. It adopts a technology program: a mobile tax control devices, including the tax control system installed on of mobile phone 5 14i,, 6 Figure 2. Mobile tax control solution 85

5 Control system 2 is a J2ME application installed on the mobile phone 8 with TF card slot 9 plugged the user IC card 3 and tax control IC card 4; it connects to credit card equipment 7 and the printing device 6 via RFID or infrared interface 5, and connects to the tax administration hosts 1 via 3G wireless interface 10. We achieve the Fiscal Business through the following steps: control system provide operator interface through display of mobile phone, receive data from keyboard of mobile phones, and sales data and control information from credit card device through RFID or infrared interface, provide customers withdraw information by display. If the credit card device is the second-generation ID card reader, the control system read the second-generation ID card number and password whose combination is sent to server-side authentication. Actually mobile phone has been converted into a mobile tax control POS machines, users need not go out for paying taxes. Here we give the design of the user IC card and tax control IC card shown in Figure 3: the chip ATmega 16L is a system control chip, chip-cg 100 is a low-power data communication transceiver chip to support SDIO 1.0 TF card specification produced by C-Guys Ltd., which use its high-speed UART (HS-UART) interface to connect ATmega 16L for the serial communication. Security module adopts the Ming-Hua company's smart card chip SmartCOS-XC, in line with IS protocols. The ATmega 16L controls card reset and 110 port. Tax system will send invoice information and sale information through CG100 to SmartCOS-XC completion of data encryption, decryption and digital signatures, as well as secure storage. In the implementation of the case, TF card can be replaced by SIM card, SD card, STK cards and IC card with a USB interface. The RFID or infrared transmission interface can also be replaced by Bluetooth interface, NFC interface and data line interface instead. 1F COl 00 UAR ATlrega 16L ISO 7816 Srmrta:>s-XC 4. Conclusion This paper presents an innovative mobile business solution, whose biggest feature is that using existing tax networks, key types and authentication methods, replacing tax control machine by the smart phones, the user can easily use smart phones to select the appropriate process to pay for the tax in fiscal way; high-quality input and output devices, information storage devices and signal transmission interfaces of smart phones are existing equipments and thus there is no need for additional facilities and cost; by using this technology, smart cards can be exempted from the restrictions. Any smart phone can complete the process, which greatly facilitates users; through the OT A, the user can easily update and upgrade tax control system on the mobile phone. Along with the third generation mobile communication networks, the mobile phones and PDA are gradually developed into a powerful platform for personal business. This method can convert mobile phone into a low-cost mobile phone business sales terminal, which significantly reduces the cost of mobile POS and greatly enhance the quality of the mobile POS hardware. Compared with the current POS on the market, it has obvious quality and price advantage. 5. Acknowledgment The authors wish to thank Ningbo Municipal Natural Science Foundation of China for contract 2009A and Zhejiang Scientific and Technological Foundation of China for contract 2009C31173, under which the present work was possible. 6. References [1] P. Tiejun, Zh. Leina, "M-commerce Security Solution Based on the 3rd Generation Mobile Communication", ISCSCT2008, IEEE Computer Society Washington, DC, USA, , pp [2] John A, "Authentication & key agreement for offportal mobile applications", Information Security Tech, Elsevier Advanced Technology Publications Oxford, UK, , pp User IC card ftax control IC card Figure 3. Design of tax control card [3] M. Stig Frode, "On-line e-wallet system with decentralized credential keepers", Mobile Networks and Applications, Kluwer Academic Publishers Hingham, , pp [4] P. Tiejun, Zh. Leina, "Mobile Payment System by Electronic Security Key", WSEAS TRANSACTIONS on SYSTEMS, WSEAS, Greece, , pp

Mobile System Technologies Certification Program

Mobile System Technologies Certification Program Mobile System Technologies Certification Program This is the Mobile Computing Promotion Consortium s (MCPC) official certification program for engineers who wish to obtain deeper knowledge of and experience

More information

Wireless E-commerce Payment and Its Development in China

Wireless E-commerce Payment and Its Development in China 200 International Conference of Information Science and Management Engineering Wireless E-commerce Payment and Its Development in China Liu Shifeng Zhejiang University, Ningbo Institute of Technology Ningbo,

More information

Ingenious Systems. Evolute System's. Mobile Payment. Initiative

Ingenious Systems. Evolute System's. Mobile Payment. Initiative Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial

More information

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved. Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password

More information

mcard CPK Supported Solutions

mcard CPK Supported Solutions mcard CPK Supported Solutions Century Longmai White Paper All rights reserved Contents 1. MTOKEN CPK CARD INTRODUCTION... 2 PRODUCT INTRODUCTION... 2 Product appearance... 3 Hardware parameters... 4 2.

More information

Mobile Office Security Requirements for the Mobile Office

Mobile Office Security Requirements for the Mobile Office Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used

More information

Electronic Commerce and E-wallet

Electronic Commerce and E-wallet International Journal of Recent Research and Review, Vol. I, March 2012 Electronic Commerce and E-wallet Abhay Upadhayaya Department of ABST,University of Rajasthan,Jaipur, India Email: abhayu@rediffmail.com

More information

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012 Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4

THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4 CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY

More information

Smart Card Evolution

Smart Card Evolution Smart Card Evolution Fernando Ferreira Departamento de Informática, Universidade do Minho 4710-057 Braga, Portugal fernando.ferreira4@mail.telepac.pt Abstract. This comunnication describes the state of

More information

Using Contactless Smart Cards for Secure Applications

Using Contactless Smart Cards for Secure Applications Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,

More information

Trusted Platforms for Homeland Security

Trusted Platforms for Homeland Security Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business

More information

Design and Implementation of Wireless Payment System using GVM and MobileC *

Design and Implementation of Wireless Payment System using GVM and MobileC * Design and Implementation of Wireless Payment System using GVM and MobileC * Sung-Lim Yun*, Eun-Bae Eom*, Jung-Sook Kim**, Se-Man Oh* 1 Dept. of Computer Engineering, Dongguk University 2 Dept. of Internet,

More information

Quectel Wireless Solutions Wireless Module Expert U10 UMTS Module Presentation

Quectel Wireless Solutions Wireless Module Expert U10 UMTS Module Presentation Quectel Wireless Solutions Wireless Module Expert U10 UMTS Module Presentation 2012-1 Contents General Description Target Applications Highlights Hardware Architecture Software Advantage Enhanced AT Commands

More information

Gemalto Mifare 1K Datasheet

Gemalto Mifare 1K Datasheet Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Wireless Networking for Small Businesses, Branches and Home Offices

Wireless Networking for Small Businesses, Branches and Home Offices Wireless Networking for Small Businesses, Branches and Home Offices Whether one believes in the Internet revolution or not, it is true that the Internet today has become an essential element in running

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

Remote Monitoring and Controlling System Based on ZigBee Networks

Remote Monitoring and Controlling System Based on ZigBee Networks Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

ETSI TR 102 071 V1.2.1 (2002-10)

ETSI TR 102 071 V1.2.1 (2002-10) TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,

More information

About Reltronics Technologies, Inc. Secure & Track Anything, Anywhere, Anytime

About Reltronics Technologies, Inc. Secure & Track Anything, Anywhere, Anytime Reltronics Technologies, Inc. specializes in Security and Tracking Solutions. The company focuses in manufacturing, deploying, and monitoring Security & Tracking systems that include radio frequency identification,

More information

Mobile Phone Terminology Simplifying telecoms management

Mobile Phone Terminology Simplifying telecoms management Mobile Phone Terminology Simplifying telecoms management _ 3G The next generation mobile network, launched in the UK in March 2003, pushed heavily by the company, Hutchison 3. The other major networks

More information

Implementation of Wireless Gateway for Smart Home

Implementation of Wireless Gateway for Smart Home Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang

More information

AXIS 5810 A Bluetooth Print Plug. Quick Start

AXIS 5810 A Bluetooth Print Plug. Quick Start AXIS 5810 AXIS 5810 A Bluetooth Print Plug Quick Start BLUETOOTH is a trademark owned by its proprietor and used by Axis Communications AB under license 1 AXIS 5810 Regulatory Information Regulatory Information

More information

Protected Cash Withdrawal in Atm Using Mobile Phone

Protected Cash Withdrawal in Atm Using Mobile Phone www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar

More information

Mobile Wallet Platform. Next generation mobile wallet solution

Mobile Wallet Platform. Next generation mobile wallet solution Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator

More information

Applying Common Criteria to a cloud type payment service

Applying Common Criteria to a cloud type payment service 1 Applying Common Criteria to a cloud type payment service Kenji Yamaya ECSEC Laboratory Inc. 2 Evaluation of a cloud system Tablet internet cloud Newly developed terminal products Mobile POS Smart Phone

More information

Secure Remote Photo Identification With ID card

Secure Remote Photo Identification With ID card Secure Remote Photo Identification With ID card Keith Jentoft 888-456-0425 kjentoft@audiosmartcard.com www.ncryptone.com 1 AudioSmartCard, group Basic concept: Remote Photo Authentication Cardholder s

More information

The Ultimate Authentication Technology

The Ultimate Authentication Technology "USB tokens will be widely adopted into the market because of their low price and greater convenience." IDC, 2003 The Ultimate Authentication Technology The Digital Identity Paradigm Network security and

More information

CanMobile. CanMobile is mobile banking service provided by Canara Bank. It helps you to do following banking transactions:

CanMobile. CanMobile is mobile banking service provided by Canara Bank. It helps you to do following banking transactions: CanMobile Frequently Asked Questions 1. What is CanMobile? CanMobile is mobile banking service provided by Canara Bank. It helps you to do following banking transactions: Balance Enquiry of accounts enabled

More information

Mobile Electronic Payments

Mobile Electronic Payments Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

PrivyLink Cryptographic Key Server *

PrivyLink Cryptographic Key Server * WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology

More information

Mobile Financial Services Business Ecosystem Scenarios & Consequences. Summary Document. Edited By. Juha Risikko & Bishwajit Choudhary

Mobile Financial Services Business Ecosystem Scenarios & Consequences. Summary Document. Edited By. Juha Risikko & Bishwajit Choudhary Mobile Financial Services Business Ecosystem Scenarios & Consequences Summary Document Edited By Juha Risikko & Bishwajit Choudhary Mobey Forum Mobile Financial Services Ltd. Disclaimer: This document

More information

Virtual KNX/EIB devices in IP networks

Virtual KNX/EIB devices in IP networks WEINZIERL ENGINEERING GmbH WEINZIERL ENGINEERING GMBH F. Heiny, Dr. Y. Kyselytsya, Dr. Th. Weinzierl Bahnhofstr. 6 D-84558 Tyrlaching Tel. +49 (0) 8623 / 987 98-03 E-Mail: info@weinzierl.de Web: www.weinzierl.de

More information

Threat Modeling for offline NFC Payments

Threat Modeling for offline NFC Payments Threat Modeling for offline NFC Payments 1 Fan Jia, 2 Yong Liu, 3 Li Zhang *1,Corresponding Author,2 Key Laboratory of Communication and Information Systems, Beijing Jiaotong University, Beijing, China,

More information

Installing, Configuring and Administering Microsoft Windows

Installing, Configuring and Administering Microsoft Windows Unit 21: Installing, Configuring and Administering Microsoft Windows Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Perform and troubleshoot an attended

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

Smart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment

Smart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment Smart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment 2009, Raritan Inc. Executive Summary While many organizations have employed

More information

Sage Payment Solutions

Sage Payment Solutions Sage Payment Solutions Mobile Payments for Business The What, Why, and How 2 SAGE PAYMENT SOLUTIONS The Basics Why does a business need mobile payments? Mobile technologies can provide incredible value,

More information

SecureD Technical Overview

SecureD Technical Overview WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD

More information

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor

More information

etoken Single Sign-On 3.0

etoken Single Sign-On 3.0 etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to

More information

Sage Intergy 6.10 Architecture Guide

Sage Intergy 6.10 Architecture Guide Reference Confidential This document and the information it contains are the confidential information of Sage. Neither this document nor the information it contains may be disclosed to any third party

More information

Short-range Low Power Wireless Devices and Internet of Things (IoT)

Short-range Low Power Wireless Devices and Internet of Things (IoT) Short-range Low Power Wireless Devices and Internet of Things (IoT) Mats Andersson, CTO, connectblue Phone: +46 40 630 71 00 Email: mats.andersson@connectblue.com Web: www.connectblue.com Version 1.1 February

More information

Introduction to Mobile Systems

Introduction to Mobile Systems Introduction to Mobile Systems EE1072 By: Alireza Mousavi (1) Lecture notes Available on: people.brunel.ac.uk/~emstaam and WebCT Sources: Electronic Enterprise Systems Modern Enterprise: Design, Manage

More information

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0 Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International

More information

That Point of Sale is a PoS

That Point of Sale is a PoS SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach

More information

CommerceGuard Secure and visible global trade

CommerceGuard Secure and visible global trade CommerceGuard Secure and visible global trade Building Technologies s 1 Advanced security solution Today s global economy depends heavily on containerized goods transport. The total container traffic volume

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management

Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management Remote control technologies can enable a system administrator to connect directly to the desktop

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Hardware & Software Solutions

Hardware & Software Solutions Hardware & Software Solutions Introduction About Proemion - Overview Capabilities - Customers 1986 RM Michaelides 2002 Proemion 2007 Production plant Introduction About RM Overview Capabilities Customers

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn

More information

Longmai Mobile PKI Solution

Longmai Mobile PKI Solution Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

NACCU 2013. Migrating to Contactless: 2013 1

NACCU 2013. Migrating to Contactless: 2013 1 NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise

More information

A secure mobile payment system *

A secure mobile payment system * Jun. 2007, Volume 1, No.1 (Monthly) Computer Technology and Application, ISSN1934-7332, USA A secure mobile payment system * LI Xi, HU Han-ping (Institute of Pattern Recognition and Artificial Intelligence,

More information

Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2

Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2 Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2 1 PG Student (M. Tech), Dept. of ECE, Chirala Engineering College, Chirala., A.P, India. 2 Assistant Professor, Dept.

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Mobile Payment in India - Operative Guidelines for Banks

Mobile Payment in India - Operative Guidelines for Banks Mobile Payment in India - Operative Guidelines for Banks 1. Introduction 1.1 With the rapid growth in the number of mobile phone subscribers in India (about 261 million as at the end of March 2008 and

More information

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.

More information

Developing Wireless GPIB Test Systems Using the GPIB-ENET/100

Developing Wireless GPIB Test Systems Using the GPIB-ENET/100 Application Note 184 Developing Wireless GPIB Test Systems Using the GPIB-ENET/100 Introduction The National Instruments GPIB-ENET/100 expands the options for size, distance, environmental conditions,

More information

Mobile Operating Systems Lesson 07 Symbian OS

Mobile Operating Systems Lesson 07 Symbian OS Mobile Operating Systems Lesson 07 Symbian OS Oxford University Press 2007. All rights reserved. 1 Oxford University Press 2007. All rights reserved. 2 Symbian OS multi-modal communication support OS for

More information

Integrated Transportation Payment Systems. Boston, MA 2009-February-27

Integrated Transportation Payment Systems. Boston, MA 2009-February-27 Integrated Transportation Payment Systems Boston, MA 2009-February-27 The Payment System Industry Perspective The following brief presentation shall highlight the system integration needs derived from

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

Your Mobile Phone as a Ticket (NFC)

Your Mobile Phone as a Ticket (NFC) Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal francisco.chaves@ist.utl.pt Abstract.

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

920MHz Band Multi-hop Wireless Network System

920MHz Band Multi-hop Wireless Network System 920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart

More information

The Goods, the Payment and the Mobile!

The Goods, the Payment and the Mobile! WHITEPAPER The Goods, the Payment and the Mobile! This whitepaper is an extract from: Mobile Payments for Digital & Physical Goods Analysis, Markets & Vendor Strategies 2011-2015... information you can

More information

Smart Vending Anywhere System Solution

Smart Vending Anywhere System Solution For UTILITY COMPANY SHENZHEN INHEMETER CO., LTD CONTENTS 1. System Introduction... 3 1.1 Smart Vending System Diagram... 3 1.2 Vending Solution... 3 1.3 System Structure... 4 2. Smart Vending Anywhere

More information

COURCE TITLE DURATION CompTIA A+ Certification 40 H.

COURCE TITLE DURATION CompTIA A+ Certification 40 H. COURCE TITLE DURATION CompTIA A+ Certification 40 H. Overview: The target student is anyone with basic computer user skills who is interested in: obtaining a job as an IT professional or PC technician.

More information

CBIO Security White Paper

CBIO Security White Paper One Canon Plaza Lake Success, NY 11042 www.ciis.canon.com CBIO Security White Paper Introduction to Canon Business Imaging Online Canon Business Imaging Online ( CBIO ) is a cloud platform for Canon s

More information

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited (Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device

More information

BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note

BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...

More information

Secure Automatic Ticketing System

Secure Automatic Ticketing System Secure Automatic Ticketing System MARIUS POPA, CRISTIAN TOMA Department of Computer Science in Economics Academy of Economic Studies Bucharest Romana Square, No. 6, Bucharest ROMANIA marius.popa@ase.ro

More information

AGAINST OUTSIDE THREATS

AGAINST OUTSIDE THREATS SECURING CONTROL NETWORKS AGAINST OUTSIDE THREATS MARK BUCKLAND MAY 2015 2015 Echelon Corporation IzoT PLATFORM PILLARS Full Monitoring and Control over IP Legacy Co-Existence and Evolution Industrial-strength

More information

Introducing etoken. What is etoken?

Introducing etoken. What is etoken? Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

15 May 2013 Version 5. for Mac OS X. Public version. Gemfor s.r.o. Tyršovo nám. 600 252 63 Roztoky Czech Republic

15 May 2013 Version 5. for Mac OS X. Public version. Gemfor s.r.o. Tyršovo nám. 600 252 63 Roztoky Czech Republic Mobile Connection Explorer for Mac OS X 15 May 2013 Version 5 Introduction and Feature s Public version Gemfor s.r.o. Contents Contents... 2 History... 2 1. Scope... 3 2. Abbreviations... 3 3. Introduction...

More information

The Research and Design of 3G terminal data confidentiality services

The Research and Design of 3G terminal data confidentiality services 2010 International Conference on E-Business and E-Government The Research and Design of 3G terminal data confidentiality services Fangzhou, Zhang, Xiaoge,Dong Dan, Wang, Xibao,Ma, Chen,Chen School of Computer

More information

White Paper. Bearer Independent Protocol (BIP)

White Paper. Bearer Independent Protocol (BIP) White Paper Bearer Independent Protocol (BIP) - 2 - Contents 1 Executive summary...4 2 Introduction...5 3 Solution description...5 3.1 Standards compliance...5 3.2 Interface architecture...6 3.3 Data carriers...9

More information

W2B Payments Complete solution for Cash Acceptance Network

W2B Payments Complete solution for Cash Acceptance Network WEB TO BUSSINESS Ltd #304, John Humphries House, 4-10 Stockwell Street, Greenwich, London, United Kingdom, SE10 9JN W2B Payments Complete solution for Cash Acceptance Network The cash is not yet dominant

More information

FareONE-Health Smart Card Presentation

FareONE-Health Smart Card Presentation FareONE-Health Smart Card Presentation Almex Smartcard Solutions Ltd. Profile Capabilities Markets Why is Almex different? About Almex: Almex is privately owned company located in Toronto, Canada Founded

More information

Offering you the New Age of Vending and Micro Markets The Most Technologically Advanced System in the World!

Offering you the New Age of Vending and Micro Markets The Most Technologically Advanced System in the World! Offering you the New Age of Vending and Micro Markets The Most Technologically Advanced System in the World! MICROTRONIC US has been in business for over 30 years and is the Major Cashless supplier around

More information

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD. HUAWEI TECHNOLOGIES CO., LTD. Product Overview The Eudemon1000E series product (hereinafter referred to as the Eudemon1000E) is a new generation of multi-function security gateway designed by Huawei to

More information

Quick Installation. A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding. Quick Installation

Quick Installation. A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding. Quick Installation Quick Installation A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding This chapter intends to get your new FuzzyScan scanner working with your existing system within minutes. General instructions

More information

How To Use Smarttrust Wib On A Sim Card On A Mobile Phone

How To Use Smarttrust Wib On A Sim Card On A Mobile Phone Application Partner Program Technology Introduction A condensed tutorial on applications in SmartTrust s technical context July 2009 version SmartTrust, your partner in VAS SmartTrust Wib is the world

More information

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India archanathange7575@gmail.com,

More information

Aegis Padlock for business

Aegis Padlock for business Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses

More information

ACER ProShield. Table of Contents

ACER ProShield. Table of Contents ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...

More information

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005 Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.

More information

Figure 1.Block diagram of inventory management system using Proximity sensors.

Figure 1.Block diagram of inventory management system using Proximity sensors. Volume 1, Special Issue, March 2015 Impact Factor: 1036, Science Central Value: 2654 Inventory Management System Using Proximity ensors 1)Jyoti KMuluk 2)Pallavi H Shinde3) Shashank VShinde 4)Prof VRYadav

More information

A FRAMEWORK FOR A MOBILE VIRTUAL TERMINAL

A FRAMEWORK FOR A MOBILE VIRTUAL TERMINAL ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA A FRAMEWORK FOR A MOBILE VIRTUAL TERMINAL

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information