Using ISO/IEC for mobile devices

Size: px
Start display at page:

Download "Using ISO/IEC 24727 for mobile devices"

Transcription

1 Using ISO/IEC for mobile devices Jan Eichholz, Giesecke & Devrient GmbH Dr. Detlef Hühnlein, secunet Security Networks AG Manuel Bach, Bundesamt für Sicherheit in der Informationstechnik Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 1

2 ISO/IEC for mobile devices Agenda ISO/IEC Using ISO/IEC for mobile devices with Mobile Signature Service in a Java Micro Edition environment Summary Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 2

3 ISO/IEC for mobile devices Agenda ISO/IEC Using ISO/IEC for mobile devices with Mobile Signature Service in a Java Micro Edition environment Summary Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 3

4 ISO/IEC architecture Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 4

5 Functions of the ISO Interface Card-application-service Access Initialize Terminate CardApplicationPath Connection-service CardApplicationConnect CardApplicationDisconnect CardApplicationStartSession CardApplicationEndSession Card-application service CardApplicationList CardApplicationCreate CardAppicationDelete CardApplicationServiceList CardApplicationServiceCreate CardApplicationServiceLoad CardApplicationServiceDelete CardApplicationServiceDescribe ExecuteAction Named data service DataSetList DataSetCreate DataSetSelect DataSetDelete DSIList DSICreate DSIDelete DSIRead DSIWrite Cryptographic service Encipher Decipher GetRandom Hash Sign VerifySignature VerifyCertificate Differential-identity service DIDList DIDCreate DIDGet DIDUpdate DIDDelete DIDAuthenticate Authorization service ACLList ACLModify Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 5

6 First ISO/IEC deployments e.g. Personal Identity Verification (PIV) e.g. European Citizen Card (ECC) e.g. Australian Drivers License Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 6

7 ecard-api-framework (BSI TR 03112, eid Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 7

8 ISO/IEC OASIS DSS (-X) eid OASIS OASIS DSS DSS (-X) (-X) ISO/IEC (CEN (CEN 15480) 15480) Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 8

9 Loyal Stack HBA egk HBA Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 9

10 Remote Loyal Stack (Internet Pharmacy) egk egk Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 10

11 Remote Loyal & ICC Stack (Citizen Services with meac) Browser Citizen Service Service-Access-Layer Service-Access-Layer Terminal-Layer Terminal-Layer meac Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 11

12 ISO/IEC for mobile devices Agenda ISO/IEC Using ISO/IEC for mobile devices with Mobile Signature Service in a Java Micro Edition environment Summary Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 12

13 Mobile Signature Service MSSP Specifies Web Service Interfaces between Application Providers (AP) and Mobile Signature Service Providers (MSSP) which allow to create digital signatures with mobile devices Standardized by ETSI TR (Business & Functional Requirements) TS (Web Service Interface) TR (Security Framework) TS (Specifications for Roaming in M-signature Services) Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 13

14 Mobile Signature Services Integration Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 14

15 Mapping ISO/IEC to ETSI [ISO24727] Part 3 CardApplication Path CardApplication StartSession DIDCreate / DIDUpdate DIDGet / [ETSI ] MSS_HandshakeReq MSS_RegistrationReq MSS_ProfileReq / MSS_StatusReq Note Besides path-information of regular cardapplications, CardApplication Path will also return a path to the virtual card-application for [ETSI ]. Using this function the AP and the MSSP agree on security mechanisms for further requests and responses. The keys of the mobile users are represented as Differential-Identites (DID). Consequently the creation of a DID corresponds to the registration of a user. DIDGet will be used to obtain information about a user profile and the status of a current transaction. DIDAuthenticate Sign MSS_SignatureReq MSS_SignatureReq Using the signing capability of the mobile device it is possible to design a challenge-response protocol for authentication. The signing capability of the mobile device may be also be used via the Sign function. As in [BSI-TR03112] the low level Sign function may be wrapped by a SignatureRequest according to [OASIS-DSS]. Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 15

16 ISO/IEC for mobile devices Agenda ISO/IEC Using ISO/IEC for mobile devices with Mobile Signature Services in a Java Micro Edition environment Summary Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 16

17 Java TM Micro Edition (JME) Started in Japan in 1999 Basic Standards (MIDP 1.0 and CLDC 1.0) available since 2000 First MIDP cell phones available since 2000 (e.g. Siemens SL45i) The Mobile Service Architecture defines a powerful platform Lot s of additional API s (SVG, M3G, MMAPI, BT, PIM, CHAPI, SIP, LOCATION, ) Deployed in over 2.1 billion mobile devices Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 17

18 JME Architecture Mobile Service Architecture (MSA) Umbrella JSR SIM access, Crypto, PKI XML, WebServices UI, pers. data, network, permissions, VM and basic APIs Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 18

19 Additional JSR s JSR 257 Contacless NFC, ISO/IEC Communication Service Connection communication SIP AMS I18N Paymnt. JSR 279 MSA Subset MSA WS SATSA CHAPI LBS PIM/FC 3D BT/ Obex SVG WMA MMAPI enhanced Web Services, SOAP, REST, Atom Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 19

20 The complete picture Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 20

21 MIDlet Integration of ISO/IEC Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 21

22 ISO/IEC for mobile devices Agenda ISO/IEC Using ISO/IEC for mobile devices with Mobile Signature Service in a Java Micro Edition environment Summary Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 22

23 Summary ISO/IEC about to become the global eid-standard MSS-based integration possible with arbitrary mobile devices, but requires additional infrastructure services (MSSP) JME offers the necessary functionality to integrate mobile devices into the ISO/IEC infrastructure NFC will push forward to integrate contactless communications into mobile devices In the mid-term, a JSR for a standardised JME interface to ISO/IEC would be beneficial Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 23

24 Deadline: Call for Papers - BIOSIG 2008 Biometric Border Control & Federated Identity Management September 11/12, 2008, Darmstadt Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 24

25 Thank you very much for your kind attention! Contact: Dr. Detlef Hühnlein secunet Security Networks AG Eichholz/Hühnlein/Bach Sicherheit 2008 Slide 25

ISO/IEC 24727 for secure mobile web applications

ISO/IEC 24727 for secure mobile web applications ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, jan.eichholz@gi-de.com 2 Infineon Technologies AG, detlef.houdeau@infineon.com

More information

Technical Guideline TR-03112-1 ecard-api-framework Overview. Version 1.1.5 draft

Technical Guideline TR-03112-1 ecard-api-framework Overview. Version 1.1.5 draft Technical Guideline TR-03112-1 ecard-api-framework Overview Version 1.1.5 draft 7. April 2015 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn E-Mail: ecard.api@bsi.bund.de

More information

How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards

How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards Detlef Hühnlein 1 and Manuel Bach 2 1 secunet Security Networks AG, Sudetenstraße 16, 96247 Michelau, Germany detlef.huehnlein@secunet.com 2 Federal

More information

Java ME & NetBeans Mobility. Petr Suchomel Architect, NetBeans Mobility Sun Microsystems

Java ME & NetBeans Mobility. Petr Suchomel Architect, NetBeans Mobility Sun Microsystems Java ME & NetBeans Mobility Petr Suchomel Architect, NetBeans Mobility Sun Microsystems Agenda Java ME introduction Java ME applications NetBeans Mobility Edition Power of advanced features Demos, demos,

More information

Technical Guideline TR-03112-7 ecard-api-framework Protocols. Version 1.1.5

Technical Guideline TR-03112-7 ecard-api-framework Protocols. Version 1.1.5 Technical Guideline TR-03112-7 ecard-api-framework Protocols Version 1.1.5 7. April 2015 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn E-Mail: ecard.api@bsi.bund.de Internet:

More information

Technical Guideline TR-03112-2 ecard-api-framework ecard-interface. Version 1.1.5

Technical Guideline TR-03112-2 ecard-api-framework ecard-interface. Version 1.1.5 Technical Guideline TR-03112-2 ecard-api-framework ecard-interface Version 1.1.5 7. April 2015 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn E-Mail: ecard.api@bsi.bund.de

More information

Smartcards with Webservice Interface

Smartcards with Webservice Interface Smartcards with Webservice Interface 22. SIT-SmartCard Workshop 8./9. February 2012 Jan Eichholz Agenda Benefits of a Webservice Interface for Smartcards The Service Access Layer out of ISO/IEC 24727 The

More information

An Open ecard Plug-in for accessing the German national Personal Health Record

An Open ecard Plug-in for accessing the German national Personal Health Record An Open ecard Plug-in for accessing the German national Personal Health Record Raik Kuhlisch 1 Dirk Petrautzki 2 Johannes Schmölz 3 Ben Kraufmann 1 Florian Thiemer 1 Tobias Wich 3 Detlef Hühnlein 3 Thomas

More information

Dynamic Bluetooth File Sharing With Cellular Devices. Project Goals

Dynamic Bluetooth File Sharing With Cellular Devices. Project Goals Dynamic Bluetooth File Sharing With Cellular Devices Steve Brar George Chen Michael Hair Jon Wagoner Project Goals Establishing a Bluetooth connection Download application software to client Look up existing

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

However first we shall discuss the importance of Java technology from the perspective of Symbian and its stakeholders.

However first we shall discuss the importance of Java technology from the perspective of Symbian and its stakeholders. Symbian on Java Author: Martin de Jode Status: Version 1.32 Date: June 2003 1. Introduction In this paper we discuss Symbian s Java offering. We shall look at the evolution of Java on Symbian OS, then

More information

An Open Source eid Simulator Open Identity Summit 9th -11th September 2013

An Open Source eid Simulator Open Identity Summit 9th -11th September 2013 An Open Source eid Simulator Open Identity Summit 9th -11th September 2013 BSI Tobias Senger HJP Consulting Holger Funke Agenda Requirements of BSI Current state Simulator Virtual Smart Card Reader Community

More information

Secure Wireless Application Platform

Secure Wireless Application Platform Texas Instruments SW@P Secure Wireless Application Platform New Challenges for Wireless Handsets Open Environment Multi-application, Interoperability Multiple Access Data Paths GSM/GPRS, EDGE, 802.11,

More information

Java Card TM Open Platform for Smart Cards

Java Card TM Open Platform for Smart Cards Java Card TM Open Platform for Smart Cards Wolfgang Effing Giesecke & Devrient GmbH C:\Presentations - JavaCard_OpenPlatform.ppt - ef - 29.04.04 - page 1 What happened in the past? Every company created

More information

Using mobile phones to access Web Services in a secure way. Dan Marinescu

Using mobile phones to access Web Services in a secure way. Dan Marinescu Using mobile phones to access Web Services in a secure way Dan Marinescu March 7, 2007 Abstract Web Services is a technology that has gained in acceptance and popularity over the past years. The promise

More information

A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL

A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL Wangjian, Xu Guoai, Zhangmiao National Engineering Laboratory for Disaster Backup and Recovery, Beijing University

More information

OVERCOMING CHANNEL BANDWIDTH CONSTRAINTS IN SECURE SIM APPLICATIONS

OVERCOMING CHANNEL BANDWIDTH CONSTRAINTS IN SECURE SIM APPLICATIONS OVERCOMING CHANNEL BANDWIDTH CONSTRAINTS IN SECURE SIM APPLICATIONS John A. MacDonald 1, William Sirett 2 and Chris J. Mitchell 1 1 Information Security Group, Royal Holloway, University of London, Egham,

More information

Conformance test specification for BSI-TR 03121 Biometrics for public sector applications

Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Technical Guideline TR-03122-2 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 2: Software Architecture - BioAPI conformance testing Version 3.0 Bundesamt

More information

Sicherheitsaspekte des neuen deutschen Personalausweises

Sicherheitsaspekte des neuen deutschen Personalausweises Sicherheitsaspekte des neuen deutschen Personalausweises Dennis Kügler Bundesamt für Sicherheit in der Informationstechnik egov Fokus 2/2013: Identity- und Access Management im E-Government Rethinking

More information

Strong Authentication in details

Strong Authentication in details Strong Authentication in details Kuznetsov Alexander Technical Account Manager VASCO Core Activities Overview DIGIPASS DIGIPASS Go Range DIGIPASS E-signature DIGIPASS Reader DIGIPASS for Mobile DIGIPASS

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

Protecting the BlackBerry device platform against malware. BlackBerry Enterprise Server Version 4.0 and later

Protecting the BlackBerry device platform against malware. BlackBerry Enterprise Server Version 4.0 and later Protecting the BlackBerry device platform against malware BlackBerry Enterprise Server Version 4.0 and later Contents BlackBerry device application platform default behavior... 3 Adding third-party applications

More information

Java 2 Enterprise Edition and Web Services

Java 2 Enterprise Edition and Web Services Java 2 Enterprise Edition and Web Services Object Management Group Web Services Workshop February 2003 William Cox BEA Systems, Inc. http://www.bea.com/ william.cox@bea.com Agenda Java Standards Web Services

More information

A Survey of Electronic Signature Development in Mobile Devices

A Survey of Electronic Signature Development in Mobile Devices A Survey of Electronic Signature Development in Devices 1, 2, 3 and 4 1 University of Murcia, Department of Information and Communications Engineering, maria@dif.um.es 2 University of Murcia, Department

More information

Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy

Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy November 18, 2008 Teresa Schwarzhoff Computer Security Division Information

More information

Touch & Travel a SIM-based eticketing System

Touch & Travel a SIM-based eticketing System Touch & Travel a SIM-based eticketing System NFC Congress Austria 08 Dr. Stephan Spitz G&D stephan.spitz@gi-de.com Agenda Project Overview System Overview Applied New Technologies and Standards Seite 2

More information

Web Services Standards: obix in the wider XML Web Services context

Web Services Standards: obix in the wider XML Web Services context www.oasis-open.org Web Services Standards: obix in the wider XML Web Services context Pim van der Eijk OASIS European Representative OASIS Mission OASIS drives the development, convergence and adoption

More information

Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions.

Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions. Smart IC Banking Banking Extending Value to Customers KONA Banking product matrix Contact - SDA Product EEPROM Java Card Type KONA Products KONA@I is leading the next generation of payment solutions Banks,

More information

Development of Java ME

Development of Java ME Y39PDA Development of Java ME application České vysoké učení technické v Praze Fakulta Elektrotechnická Content What is Java ME Low Level a High Level API What is JSR LBS Java ME app. life-cycle 2/29 Is

More information

Quality Management in Open Source Projects

Quality Management in Open Source Projects Quality Management in Open Source Projects Experiences from the Open ecard Project Daniel Nemmert, Hans-Martin Haase, Detlef Hühnlein, Tobias Wich >> 1 Agenda The Open ecard App Open Source Projects Success

More information

NFC Mobile Handset High Level Requirements V2

NFC Mobile Handset High Level Requirements V2 NFC Mobile Handset High Level Requirements V2 Release 2.0 Date : 28/09/2011 Reference: 110928 - AFSCM TECH - LIVBL - NFC Mobile Handset High Level Requirements - v2.0.doc AFSCM NFC Mobile Handset High

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas

More information

E-signatur/eID: Standardisering i Europa og ISO og koordinering. Asbjørn Hovstø og Jon Ølnes Norstella eid fagutvalg 20/3 2014

E-signatur/eID: Standardisering i Europa og ISO og koordinering. Asbjørn Hovstø og Jon Ølnes Norstella eid fagutvalg 20/3 2014 E-signatur/eID: Standardisering i Europa og ISO og koordinering Asbjørn Hovstø og Jon Ølnes Norstella eid fagutvalg 20/3 2014 Standard Norge referansegrupper SN/K 171: IT-sikkerhet Komiteen skal være nasjonal

More information

Biometrics for Public Sector Applications

Biometrics for Public Sector Applications Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach

More information

Caught in the Maze of Security Standards

Caught in the Maze of Security Standards Caught in the Maze of ΓΝΩΘΙΣ Know Thyself ΑΥΤΟΝ Security Standards Dieter Gollmann Hamburg University of Technology What this talk is not about 1. Designing security protocols is difficult and error prone

More information

Biometrics for public sector applications

Biometrics for public sector applications Technical Guideline TR-03121-1 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany Email:

More information

Introduction to Oracle WebLogic. Presented by: Fatna Belqasmi, PhD, Researcher at Ericsson

Introduction to Oracle WebLogic. Presented by: Fatna Belqasmi, PhD, Researcher at Ericsson Introduction to Oracle WebLogic Presented by: Fatna Belqasmi, PhD, Researcher at Ericsson Agenda Overview Download and installation A concrete scenario using the real product Hints for the project Overview

More information

Conformance test specification for BSI-TR 03121 Biometrics for public sector applications

Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Technical Guideline TR-03122-1 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik

More information

Draft SR 019 020 V0.0.4 (2013-11)

Draft SR 019 020 V0.0.4 (2013-11) SPECIAL REPORT Rationalised Framework of Standards for Advanced Electronic Signatures in Mobile Environment STABLE DRAFT FOR PUBLIC REVIEW UNTIL 15 JANUARY 2014 Download the template for comments: http://docbox.etsi.org/esi/open/latest_drafts/templatefor-comments.doc

More information

Smart Card Technology Capabilities

Smart Card Technology Capabilities Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards

More information

Mobility Solutions in IBM

Mobility Solutions in IBM Mobility Solutions in IBM Cecelia Yu yuyc@tw.ibm.com Mobile Collaboration, CDL, IBM 2007 IBM Corporation Agenda 1. Introduction 2. Mobility Strategy 2.1 Connectivity 2.2 E-Mail 2.3 Social Network 2.4 Instant

More information

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations R.S.S.Vishnu Priya, P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad, P.D.Nageswara Rao Dept. of CSE, KLCE Vaddeswaram,

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

Chytré karty opět o rok dál...

Chytré karty opět o rok dál... Chytré karty opět o rok dál... SmartCardForum 2010 Jan Němec Product expert, Gemalto Květen 2010 Agenda Chytré karty včera, dnes a zítra Úvod do problematiky NFC Integrace NFC do mobilních zařízení Java

More information

Transaction Security. Training Academy

Transaction Security. Training Academy Transaction Security Training Academy Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES

COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES BSI TR-03139 Version 2.1 27 May 2013 Foreword The present document

More information

Identification Card Digital Identity Security and Services Siniša Macan, DG of Agency

Identification Card Digital Identity Security and Services Siniša Macan, DG of Agency Agency for Identification Documents, Registers and Data Exchange of Bosnia and Herzegovina Identification Card Digital Identity Security and Services Siniša Macan, DG of Agency sinisa.macan@iddeea.gov.ba

More information

JCAT. Java Card TM. An environment for attack and test on. Serge Chaumette, Iban Hatchondo, Damien Sauveron CCCT 03 & ISAS 03

JCAT. Java Card TM. An environment for attack and test on. Serge Chaumette, Iban Hatchondo, Damien Sauveron CCCT 03 & ISAS 03 CCCT 03 & ISAS 03 JCAT An environment for attack and test on Java Card TM Serge Chaumette, Iban Hatchondo, http:/www.labri.fr/~sauveron/ 2 nd august 2003 Plan 1) The Java Card Security project Context

More information

BlackBerry Architecture. Anthony Scian Principal Developer Research in Motion

BlackBerry Architecture. Anthony Scian Principal Developer Research in Motion BlackBerry Architecture Anthony Scian Principal Developer Research in Motion Background CS/EEE BMath 1987, MMath 1990 Co-op FORTRAN, C compilers Pascal, BASIC interpreters After graduation Watcom, Powersoft,

More information

Exploring ADSS Server Signing Services

Exploring ADSS Server Signing Services ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)

More information

Java Card. Smartcards. Demos. . p.1/30

Java Card. Smartcards. Demos. . p.1/30 . p.1/30 Java Card Smartcards Java Card Demos Smart Cards. p.2/30 . p.3/30 Smartcards Credit-card size piece of plastic with embedded chip, for storing & processing data Standard applications bank cards

More information

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved. A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role

More information

Oracle Java Micro Edition Software Development Kit

Oracle Java Micro Edition Software Development Kit Oracle Java Micro Edition Software Development Kit Release Notes Release 3.0.5 for Windows E25309-04 April 2012 Contents Release Highlights Prerequisites Installation Installation and Runtime Security

More information

Extreme Java G22.3033-006. Session 3 Main Theme Java Core Technologies (Part I) Dr. Jean-Claude Franchitti

Extreme Java G22.3033-006. Session 3 Main Theme Java Core Technologies (Part I) Dr. Jean-Claude Franchitti Extreme Java G22.3033-006 Session 3 Main Theme Java Core Technologies (Part I) Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Agenda

More information

eid and the principle of Privacy by Design (PbD)

eid and the principle of Privacy by Design (PbD) eidas Workshop ETSI Sophia Antipolis June 24, 2015 eid and the principle of Privacy by Design (PbD) Denis PINKAS President of DP Security Consulting SASU France 1 /27 The topic of the Regulation that is

More information

Location-Based Information Systems

Location-Based Information Systems Location-Based Information Systems Developing Real-Time Tracking Applications Miguel A Labrador Alfredo J Perez Pedro M Wightman CRC Press Taylor & Francis Group Boca Raton London New York CRC Press Is

More information

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0 Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International

More information

A Comparison of Mobile Peer-to-peer File-sharing Clients

A Comparison of Mobile Peer-to-peer File-sharing Clients 1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics

More information

VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan

VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s

More information

Smart Card Application Development Using Java

Smart Card Application Development Using Java Uwe Hansmann Martin S. Nicklous Thomas Schack Frank Seliger Smart Card Application Development Using Java With 98 Figures, 16 Tables and a Multi Function Smart Card Springer Table of Contents Preface 1

More information

Mobile application download: key considerations for mobile operators

Mobile application download: key considerations for mobile operators www.northstream.se Mobile application download: key considerations for mobile operators Key points: Operators introducing application download services face a choice between a number of technologies, each

More information

Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue

Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Zsolt Sikolya Ministry of Informatics and Communications (IHM) Tel: +3614613366, Fax: +3614613548

More information

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015 MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture

More information

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007 Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes

More information

The German eid-card. Jens Bender. Federal Office for Information Security Bundesamt für Sicherheit in der Informationstechnik

The German eid-card. Jens Bender. Federal Office for Information Security Bundesamt für Sicherheit in der Informationstechnik The German eid-card Federal Office for Information Security Bundesamt für Sicherheit in der Informationstechnik eid Workshop KU Leuven / The German Electronic ID-Card (Elektronischer Personalausweis) Motivation

More information

Java Platform, Micro Edition (Java ME) Mokoena F.R. The 7046 Team

Java Platform, Micro Edition (Java ME) Mokoena F.R. The 7046 Team Java Platform, Micro Edition (Java ME) Mokoena F.R The 7046 Team 1. Introduction Java Platform, Micro Edition (Java ME) technology is one of the popular mobile application runtime. It provides developers

More information

exceet Secure Solutions Smart & Secure Network From Vision to Reality

exceet Secure Solutions Smart & Secure Network From Vision to Reality exceet Secure Solutions Smart & Secure Network From Vision to Reality Agenda 1. About exceet 2. Entering the World of Smart Connected Products 3. exceet s Transformation Developing New Competencies 4.

More information

Deriving a Trusted Mobile Identity from an Existing Credential

Deriving a Trusted Mobile Identity from an Existing Credential Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile

More information

Mobile Certificate Based Network Services

Mobile Certificate Based Network Services Issues in Informing Science and Information Technology Volume 10, 2013 Mobile Certificate Based Network Services Göran Pulkkis and Farzan Yazdani Arcada University of Applied Sciences, Helsinki, Finland

More information

Guiding Principles for Technical Architecture

Guiding Principles for Technical Architecture This document is a statement of the principles that will guide the technical development of the Kuali Student system. It will serve as a reference throughout the full lifecycle of the project. While these

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

Digital Signature Verification using Historic Data

Digital Signature Verification using Historic Data Digital Signature Verification using Historic Data Digital signatures are now relatively common; however historic verification of digitally signed data is not so widely understood. As more data is held

More information

Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager

Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager Embedding digital signature technology to other systems - Estonian practice Urmo Keskel SK, DigiDoc Product Manager E-stonia? Population: 1.35M Internet usage: 54% Internet banking: 72% Mobile penetration:

More information

Future of Mobile Java and Mobility Middleware

Future of Mobile Java and Mobility Middleware Future of Mobile Java and Mobility Middleware Jon Bostrom CTO okia Java Platform copyright 2004 by OSGi Alliance All rights reserved. The Mobile Application Ecosystem >100 operators deployed Java >300

More information

Datasheet FUJITSU Security Solution Compliant Archiving SecDocs V2.3

Datasheet FUJITSU Security Solution Compliant Archiving SecDocs V2.3 Datasheet FUJITSU Security Solution Compliant Archiving SecDocs V2.3 An archiving middleware based on open standards which preserves the evidentiary value powered by OpenLimit Digital Long-Term Archiving

More information

On the design and implementation of the Open ecard App

On the design and implementation of the Open ecard App On the design and implementation of the Open ecard App Detlef Hühnlein 1 Dirk Petrautzki 2 Johannes Schmölz 1 Tobias Wich 1 Moritz Horsch 1,3 Thomas Wieland 2 Jan Eichholz 4 Alexander Wiesmaier 5 Johannes

More information

Making Digital Signatures Work across National Borders

Making Digital Signatures Work across National Borders Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det

More information

Mobile ID: Realization of Mobile Identity Solutions by GlobalPlatform Technologies. White Paper November 2015

Mobile ID: Realization of Mobile Identity Solutions by GlobalPlatform Technologies. White Paper November 2015 Mobile ID: Realization of Mobile Identity Solutions by GlobalPlatform Technologies White Paper November 2015 secretariat@globalplatform.org www.globalplatform.org 2015 GlobalPlatform Inc. Table of Contents

More information

PKI - current and future

PKI - current and future PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi

More information

Oracle Security Developer Tools (OSDT) August 2008

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008 Oracle Security Developer Tools (OSDT) August 2008 Items Introduction OSDT 10g Architecture Business Benefits Oracle Products Currently Using OSDT 10g OSDT 10g APIs Description OSDT

More information

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior

More information

Security Evaluation of J2ME CLDC Embedded Java Platform

Security Evaluation of J2ME CLDC Embedded Java Platform Vol. 5, No. 2, March April 2006 Security Evaluation of J2ME CLDC Embedded Java Platform Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi and Sami Zhioua Computer Security Laboratory Concordia Institute

More information

Nokia 9210i/9290 Communicators and PersonalJava TM Application Development

Nokia 9210i/9290 Communicators and PersonalJava TM Application Development Nokia 9210i/9290 Communicators and Personal TM Application Development 05-03-2002 Nokia 9210i/9290 Communicators and PersonalTM Application Development Table of contents 1. DIFFERENT JAVA TECHNOLOGIES...

More information

User. Role. Privilege. Environment. Checkpoint. System

User. Role. Privilege. Environment. Checkpoint. System 8. Security Features Motivation Viruses, spam, trojan horses have become increasingly common in PC environment In mobile environment, new kinds of opportunities offered for malicious software Potentially

More information

A Survey of Electronic Signature Solutions in Mobile Devices

A Survey of Electronic Signature Solutions in Mobile Devices Antonio Ruiz-Martínez 1, Daniel Sánchez-Martínez 2, María Martínez-Montesinos 3 and 4 University of Murcia, Department of Information and Communications Engineering, 1 arm@dif.um.es, 2 dsm@dif.um.es, 3

More information

Position Paper European Citizen Card: One Pillar of Interoperable eid Success

Position Paper European Citizen Card: One Pillar of Interoperable eid Success Position Paper European Citizen Card: One Pillar of Interoperable eid Success October 2008 Disclaimer Eurosmart takes reasonable measures to ensure the quality of the information contained in this document.

More information

FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic

FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic FOR A PAPERLESS FUTURE Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic PAPER IS EVERYWHERE WHY IS THAT? Please no more! Every large organization is typically large paper producer Banks, insurance,

More information

Introduction to SunOne Development Tools by Mr. Mickey Fan, Java Architect, Sun Microsystems. Good morning. Ladies and Gentlemen.

Introduction to SunOne Development Tools by Mr. Mickey Fan, Java Architect, Sun Microsystems. Good morning. Ladies and Gentlemen. Introduction to SunOne Development Tools by Mr. Mickey Fan, Java Architect, Sun Microsystems Good morning. Ladies and Gentlemen. the mobile edition. I am glad to be invited to be here. Today my topic is

More information

AlphaTrust PRONTO Enterprise Platform Product Overview

AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform is server-based software that automates the creation of legally enforceable, permanent business records that

More information

Defending the Internet of Things

Defending the Internet of Things Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity

More information

Your Mobile Phone as a Ticket (NFC)

Your Mobile Phone as a Ticket (NFC) Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal francisco.chaves@ist.utl.pt Abstract.

More information

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014 Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent

More information

Biometrics for Public Sector Applications

Biometrics for Public Sector Applications Technical Guideline TR-03121-1 Biometrics for Public Sector Applications Part 1: Framework Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany Email:

More information

The Study on Mobile Phone-oriented Application Integration Technology of Web Services 1

The Study on Mobile Phone-oriented Application Integration Technology of Web Services 1 The Study on Mobile Phone-oriented Application Integration Technology of Web Services 1 Li Luqun 1, 2 Li Minglu 1 Cui Xianguo 2 1. Department of Computer Science of Shanghai Jiaotong University, 1954 Huashan

More information

Biometrics for public sector applications

Biometrics for public sector applications Technical Guideline TR-03121-2 Biometrics for public sector applications Part 2: Software Architecture Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany

More information

Security Management interoperability challenges for Collaborative Clouds

Security Management interoperability challenges for Collaborative Clouds Security interoperability challenges for Collaborative Clouds 4th International DMTF Academic Alliance Workshop on Systems and Virtualization : Standards and the Cloud (SVM 2010) - 29/10/2010 [Michael.Kretzschmar,

More information

Mobile Operating Systems. Week I

Mobile Operating Systems. Week I Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone

More information