Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets

Size: px
Start display at page:

Download "Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets"

Transcription

1 ICT Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets Deliverable Security related services evaluation phase 1 Workpackage: Authors: Status: WP5 Service and Application Development Aranzazu Narganes (CGI), Susana Ortega Guilló(CGI) Draft Date: 19/09/2014 Version: 0.5 Classification: Public Disclaimer: The OPENi project is co-funded by the European Commission under the 7 th Framework Programme. This document reflects only authors views. EC is not liable for any use that may be done of the information contained therein.

2 OPENi Project Profile Contract No.: Acronym: Title: URL: FP7-ICT OPENi Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets Start Date: 01/10/2012 Duration: 30 months Partners Waterford Institute of Technology Coordinator Ireland National Technical University of Athens (NTUA), Decision Support Systems Laboratory, DSSLab Greece Fraunhofer-Gesellschaft Zur Foerderung Der Angewandten Forschung E.V Germany INFORMATICA GESFOR SA Spain AMBIESENSE LTD UK VELTI SA Greece BETAPOND LIMITED Ireland 2

3 Document History Version Date Author (Partner) Remarks /07/2014 Aranzazu Narganes (CGI) First version /08/2014 Susana Ortega (CGI) Minor updates /09/2014 Susana Ortega(CGI) Updates /09/2014 Susana Ortega (CGI) Minor updates /09/2014 Susana Ortega (CGI) Fixing advices from reviewers 3

4 Executive Summary This deliverable describes the outcome of T5.1 Security related services evaluation software, phase 1 of the OPENi project. This task is responsible of developing the Service Enablers that provide enhanced features to OPENi developers. These features will be available for WP6 applications. For this first phase, the selected security related service is the Biometric Recognition Service Enabler (SE). For this Service Enabler, it is provided its features, design and a demonstration for the first phase implementation. This Service Enabler (SE) first prototype will be evolved in the next phase in order to enhance their functionalities or implement the missing ones. 4

5 Table of Contents 1 Introduction Biometrics SE Overview, Motivation and Goals Overview Motivation, Goals and innovations Methodology Biometrics SE Design and Architecture Component overview Workflow API Specification Biometrics SE prototype Implementation Outline key components in the Implementation phase How it will interface with OPENi Biometrics SE Demonstration and Source code Biometrics SE Conclusions and Outlook

6 1 Introduction Biometric authentication has to ways to confirm the user s identity and profile in an organization: using one or more physical traits or using a behavioural feature. This kind of processes have greatly increased in popularity with the advent of faster computer processors and increased quality in the data collection devices. Physical traits are body features as fingerprint, iris, or ratios between facial features, while behavioural features as speech and tone cadence or rhythm. In the field of security services, the only identified SE so far is the Biometric Comparison SE. This SE will take advantage in mobile devices improvements about sensors and gadgets to be used in any physical property of the device owner. At this point, the OPENi Biometric comparison SE has focused on face recognition. 6

7 2 Biometrics SE Overview, Motivation and Goals 2.1 Overview The Biometric Comparison Service Enabler (SE) is included in the Task 5.1 as part of the Security related Services in combination with the Security Framework. This SE aims at give OPENi developers the opportunity of including one more security level in their applications. 2.2 Motivation, Goals and innovations For many years, the identification process in an application has been providing a written login and password to access the system. This has been also the traditional method for mobile applications to identify users. Biometric recognition has risen as the most secure identification process. A Gartner report 1 from last year predicts that 30% of all companies will use biometric recognition on mobile devices by Mobile devices are evolving in such a high speed that in a near future almost very mobile device will be able to accept some kind of biometric recognition. Fingerprint, facial and voice recognition, are the most extended biometrics to identify a user. Among biometric recognition methods we have focused on face recognition. Nowadays, nearly all mobile devices have a good quality camera. We use this camera for taking a picture of the user and comparing it with other ones stored into the device. 2.3 Methodology The focus in this first phase for the Service Enablers has been placed in: a) the design of Biometric Comparison SE (in terms of features, information flow and APIs); b) the design and implementation of the Biometric Comparison SE GUI (android application); In the second phase it is intended to integrate the Biometric Comparison SE in the OPENi platform and Security component

8 3 Biometrics SE Design and Architecture 3.1 Component overview The objective of BIOMETRIC SE Prototype is to allow users to log on to their applications across a picture of theirs. This is called face recognition. This process can be split three steps: Face detection: identify a face into a photo Feature extraction: identify key features as distance between eyes Face recognition: identify if the given image matches with the set of stored ones. 3.2 Workflow At this time, the Biometric SE prototype is an Android library which a developer can add to his application. There are two main steps in the flow: training and recognition. First step when using Biometric SE is running the training operation. In the training operation, user s face photos are stored into the mobile device and they will be the identification key for the user. At least ten images are needed to be stored in order to guarantee the recognition. The subsequent recognition process compares one photo, taken in the current moment, with the stored ones for the current user. For the time being, training images are stored into the user s device. In the next phase these images will be stored into the user s cloudlet. The objective of the first implementation phase is providing to the developer a basic API with the features to include in the OPENi application. Training The library identifies the person who will be able to log on to the application. Figure 1: Diagram for Training feature 8

9 The prerequisite for training is having ten stored images of the person when logging. The images names must have the following format: name + i + jpg, where i is an integer between 1 and 10. The developer must call the public method train in which the training operation is performed. The steps in this method are: Storing 10 images Detecting faces in every one of those images Generating a gray image from each of the stored ones. A correspondence between every of the original images and their gray one is established. Generating a storage space in which to store this correspondence Recognition The library recognizes the person in the picture as a valid user of the application. Figure 2: Diagram from recognition feature The developer must call the public method recognize. The steps followed to perform this action are listed below: Charging the image from the user who intends to be identified. Detecting the face in the provided image. Processing the image with opencv methods. With opencv FaceRecognizer, this image will be compared with the stored training images. A Boolean will be returned depending on the result of recognition process. 9

10 3.3 API Specification For this first phase, the defined Android API is the following cloudlet which user is going to be identified **/ public void train(string cloudletid) cloudlet which user is going to be Image file which is going to be used to identify the cloudlet owner. **/ public boolean recognize(string cloudletid, File myimage) 10

11 4 Biometrics SE prototype Implementation 4.1 Outline key components in the Implementation phase The Prototype BIOMETRIC SE is a library based on open source technology. It has been developed using JavaCV 2 with OpenCV 3 for Android. We have selected the OpenCV due to it has become the main tool for software computer vision, is open source and it provides an Android SDK. Wide information and examples are available. One main point to have in mind is that OpenCV needs a huge amount of RAM to process images. The minimum requirements for developing with OpenCV in Android are the following: Sun JDK 6 (Sun JDK 7 is also possible) Android SDK Tools, revision 20 or newer. SDK Platform Android 3.0 (API 11): Android 2.2 (API 8 is the minimal platform supported by OpenCV Java) 4.2 How it will interface with OPENi The Biometric SE will be in full contact with the Authentication and Authorization component. This will be the component which will really give access to the OPENi platform. On the other hand, the future Service Enabler will have to access to the cloudlet in order to access to the user s personal data e.g. to the user s profile photo, to compare it with the given one. So that, we can say the Biometric SE will interact with components from WP4: Profile API (supposed the images for training are accessible via this API) Authentication & Authorization (next phase) User s cloudlet And of course, any application developed in WP6 or by any OPENi developer will be able to add this feature to its development

12 Figure 3: Biometric SE specification 12

13 5 Biometrics SE Demonstration and Source code To demonstrate the operation of BIOMETRIC SE, we have implemented a test application that only includes a button that connects to the library of facial recognition (Figure 4). Figure 4: Login to the app Once we are in the face recognition application, we can use either the front camera or the back one, by clicking the camera application button (Figure 5). 13

14 Figure 5: Screen with camera button Training The "Entrenar" (Training) button is pressed, the face is focused, the person's name is entered, the "Rec" button and finally press the "Parar Entreno" (Stop Training) button (Figure 6) is pressed. Figure 6: Training process Recognition Face is focused, press the button "Buscar" (Search) on the application for testing, if the application of facial recognition focused person recognizes the initial application will be displayed with an OK message (Figure 7). In case you do not recognize the person in focus the initial application will be displayed with a message of KO (Figure 8). 14

15 Figure 7: Ok result Figure 8: Failed to recognize one face 15

16 6 Biometrics SE Conclusions and Outlook With the Biometric Comparison SE, OPENi is able to offer a higher level of security to developers. Each of them will decide if include this feature to his application. Next step for this component will be implementing the interaction with de Authentication and Authorization component and the cloudlet integration. After that, we will try to add any other biometric comparison as identifying the user by a sequence of video, with gestures directed (randomly) by the application. In such use case, the pattern would be a video of the user. The user is told by the mobile phone when the user must smile and when not. That way, the hacking of the system by showing a static picture of the user is not possible. 16

ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software. Engineering, FP7-ICT-2011-8. WP1 Coordination and Management

ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software. Engineering, FP7-ICT-2011-8. WP1 Coordination and Management ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal

More information

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal

More information

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal

More information

PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS

PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS www.openi-ict.eu Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS Open-Source,

More information

ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8

ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal

More information

APPLICATION NOTE. Getting Started with pylon and OpenCV

APPLICATION NOTE. Getting Started with pylon and OpenCV APPLICATION NOTE Getting Started with pylon and OpenCV Applicable to all Basler USB3 Vision, GigE Vision, and IEEE 1394 cameras Document Number: AW001368 Version: 01 Language: 000 (English) Release Date:

More information

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets Ref. Ares(2013)131534-01/02/2013 ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social

More information

How to Pay Fees in Municity Android January 2, 2015

How to Pay Fees in Municity Android January 2, 2015 How to Pay Fees in Municity Android January 2, 2015 This document presents Municity Android fee payment requirements, and provides instructions describing how uses can accept fees. A workflow diagram,

More information

Develop a Hello World project in Android Studio Capture, process, store, and display an image. Other sensors on Android phones

Develop a Hello World project in Android Studio Capture, process, store, and display an image. Other sensors on Android phones Kuo-Chin Lien Develop a Hello World project in Android Studio Capture, process, store, and display an image on Android phones Other sensors on Android phones If you have been using Eclipse with ADT, be

More information

Challenges in Android Application Development: A Case Study

Challenges in Android Application Development: A Case Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294

More information

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research

More information

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.

More information

ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8

ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal

More information

MICROSOFT OFFICE 365 MIGRATION 2013/05/13

MICROSOFT OFFICE 365 MIGRATION 2013/05/13 MICROSOFT OFFICE 365 MIGRATION 2013/05/13 WHAT IS OFFICE 365 Office 365 provides virtually anywhere access to familiar Office tools Word WEB App Excel WEB App PowerPoint WEB App Enterprise-grade email

More information

Enrollment Process for Android Devices

Enrollment Process for Android Devices 1 Enrollment Process for Android Devices Introduction:... 2 Pre-requisites:... 2 Via SMS:... 2 Via Email:... 11 Self Service:... 19 2 Introduction: This is a brief guide to enrolling an android device

More information

Load testing with. WAPT Cloud. Quick Start Guide

Load testing with. WAPT Cloud. Quick Start Guide Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica

More information

BehavioSec participation in the DARPA AA Phase 2

BehavioSec participation in the DARPA AA Phase 2 BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper

More information

Fast remote data access for control of TCP/IP network using android Mobile device

Fast remote data access for control of TCP/IP network using android Mobile device RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi

More information

Remote Android Assistant with Global Positioning System Tracking

Remote Android Assistant with Global Positioning System Tracking IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 95-99 Remote Android Assistant with Global Positioning System Tracking

More information

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens...15. BlackVue Cloud...24. BlackVue Wi-Fi...40. Internal Memory...

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens...15. BlackVue Cloud...24. BlackVue Wi-Fi...40. Internal Memory... Table of Contents BlackVue Cloud App Overview...3 Key Functions When Cloud is Connected...4 Key Functions When Wi-Fi Connection is Made...4 Key Features of Internal Memory...4 Supported Devices...5 Getting

More information

Multi-factor Mobile Authentication

Multi-factor Mobile Authentication Multi-factor Mobile Authentication Ram Ramachandran Program Director, Adv. Technologies IBM Research pgramach@us.ibm.com June 9, 2014 Password Authentication Who is using this mobile device? Valuable information

More information

Affdex SDK for Android. Developer Guide For SDK version 1.0

Affdex SDK for Android. Developer Guide For SDK version 1.0 Affdex SDK for Android Developer Guide For SDK version 1.0 www.affdex.com/mobile-sdk 1 August 4, 2014 Introduction The Affdex SDK is the culmination of years of scientific research into emotion detection,

More information

OPEN INNOVATION IN THE MOBILE APP ECOSYSTEM: OPENI PERSPECTIVE ON APIS & SOCIAL WEB

OPEN INNOVATION IN THE MOBILE APP ECOSYSTEM: OPENI PERSPECTIVE ON APIS & SOCIAL WEB www.openi-ict.eu Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets OPEN INNOVATION IN THE MOBILE APP ECOSYSTEM: OPENI PERSPECTIVE ON APIS

More information

Introduction to Adobe Connect

Introduction to Adobe Connect Introduction to Adobe Connect Faculty Support Services Academic Technology Services & User Support Cornell Information Technologies USING ADOBE CONNECT CONTENTS Introduction... 3 Create a meeting room...

More information

PrintRover Cloud. Administrator Manual

PrintRover Cloud. Administrator Manual PrintRover Cloud Administrator Manual Copyright Disclaimer Trademarks and patents Intended use Copyright 2013, Thinxtream Technologies Pte. Ltd. All rights reserved. This document may not be copied in

More information

Apps for Android. Apps for iphone & ipad INS584-3

Apps for Android. Apps for iphone & ipad INS584-3 Apps for iphone & ipad INS584-3 Apps for Android Android is a trademark of Google Inc. iphone is a trademark of Apple Inc., registered in the U.S. and other countries. ipad is a trademark of Apple Inc.,

More information

French Justice Portal. Authentication methods and technologies. Page n 1

French Justice Portal. Authentication methods and technologies. Page n 1 French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication

More information

Installation Instructions for SAP GUI for Java 7.4

Installation Instructions for SAP GUI for Java 7.4 Installation Instructions for SAP GUI for Java 7.4 Version 1 January 2015 Overview This guide will provide the necessary steps to install the SAP JAVA GUI to access the CHEP SAP environment. Please note

More information

Using the owncloud Android App

Using the owncloud Android App Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special

More information

VOL. 2, NO. 1, January 2012 ISSN 2225-7217 ARPN Journal of Science and Technology 2010-2012 ARPN Journals. All rights reserved

VOL. 2, NO. 1, January 2012 ISSN 2225-7217 ARPN Journal of Science and Technology 2010-2012 ARPN Journals. All rights reserved Mobile Application for News and Interactive Services L. Ashwin Kumar Department of Information Technology, JNTU, Hyderabad, India loka.ashwin@gmail.com ABSTRACT In this paper, we describe the design and

More information

How to Use Print from E-mail Register the printer

How to Use Print from E-mail Register the printer How to Use Print from E-mail Register the printer 1 Registering the printer to Print from E-mail Register your printer to Print from E-mail in three steps below. When the printer is properly registered,

More information

XMEye Android Mobile Monitoring Client English Manual

XMEye Android Mobile Monitoring Client English Manual XMEye Android Mobile Monitoring Client English Manual Written by: The test department Prepared Date: 2014-03-25 Version: V1.0 目 录 1. Introduction... 3 1.1. Brief Introduction... 3 1.2. Main Functions...

More information

D3.4.1: Data Fusion Tools

D3.4.1: Data Fusion Tools COMPETITIVINESS AND INNOVATION FRAMEWORK PROGRAMME CIP-ICT-PSP-2013-7 Pilot Type B WP3 Service platform integration and deployment in cloud infrastructure D3.4.1: Data Fusion Tools Deliverable Lead: NETCAD

More information

SEACW DELIVERABLE D.1.6

SEACW DELIVERABLE D.1.6 SEACW DELIVERABLE D.1.6 Validation Methodology Specifications Project Acronym SEACW Grant Agreement No. 325146 Project Title Deliverable Reference Number Deliverable Title Social Ecosystem for Antiaging,

More information

Personal Cloud. Support Guide for Mobile Apple Devices

Personal Cloud. Support Guide for Mobile Apple Devices Personal Cloud Support Guide for Mobile Apple Devices Storing and sharing your content 2 Getting started 2 How to use the application 2 Managing your content 2 Adding content manually 2 Downloading files

More information

Final Year Project Interim Report

Final Year Project Interim Report 2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)

More information

Quick guide steps you need to take

Quick guide steps you need to take Single Sign On user manual (EMM SSO) From website http://www.emm.sk/download/emm-sso we will download file EMM-SSO.ZIP. The file needs to be unpacked and installation programme SETUP.EXE must be run. The

More information

Role of Multi-biometrics in Usable Multi- Factor Authentication

Role of Multi-biometrics in Usable Multi- Factor Authentication Role of Multi-biometrics in Usable Multi- Factor Authentication Dr. Nalini K Ratha* IBM T.J. Watson Research Center Yorktown Heights, NY 10598 ratha@us.ibm.com *: In collaboration with colleagues from

More information

Sharepoint Manual for the Joint Action on Health Workforce Planning and Forecasting

Sharepoint Manual for the Joint Action on Health Workforce Planning and Forecasting Sharepoint Manual for the Joint Action on Health Workforce Planning and Forecasting Contents Getting started... 1 The main site... 3 The work Package sites... 5 Working together in documents... 8 Getting

More information

Self Service Portal and 2FA User Guide

Self Service Portal and 2FA User Guide Self Service Portal and 2FA User Guide Accessing Symantec Self Service Portal Self Service Portal (SSP) is a web-based application which you can use to register, test, reset, or remove Symantec VIP credentials.

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Single Sign-On Access Management A Technical Framework on Access Management Systems

Single Sign-On Access Management A Technical Framework on Access Management Systems Single Sign-On Access Management A Technical Framework on Access Management Systems Polaris Software Lab Ltd., 766, Anna Salai, Chennai, INDIA 600 006 Single Sign-On Access Management Service This paper

More information

OneDrive in Office 365

OneDrive in Office 365 OneDrive in Office 365 OneDrive is a universal tool that allows you to upload and share documents with others. You can upload Word Documents, PDFs, Excel spreadsheets, images, and other Office files. Contents

More information

Issues of Hybrid Mobile Application Development with PhoneGap: a Case Study of Insurance Mobile Application

Issues of Hybrid Mobile Application Development with PhoneGap: a Case Study of Insurance Mobile Application DATABASES AND INFORMATION SYSTEMS H.-M. Haav, A. Kalja and T. Robal (Eds.) Proc. of the 11th International Baltic Conference, Baltic DB&IS 2014 TUT Press, 2014 215 Issues of Hybrid Mobile Application Development

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

D3.3.1: Sematic tagging and open data publication tools

D3.3.1: Sematic tagging and open data publication tools COMPETITIVINESS AND INNOVATION FRAMEWORK PROGRAMME CIP-ICT-PSP-2013-7 Pilot Type B WP3 Service platform integration and deployment in cloud infrastructure D3.3.1: Sematic tagging and open data publication

More information

Getting Started Guide for Developing tibbr Apps

Getting Started Guide for Developing tibbr Apps Getting Started Guide for Developing tibbr Apps TABLE OF CONTENTS Understanding the tibbr Marketplace... 2 Integrating Apps With tibbr... 2 Developing Apps for tibbr... 2 First Steps... 3 Tutorial 1: Registering

More information

BlackHawk for MAC Software User Guide

BlackHawk for MAC Software User Guide BlackHawk for MAC Software User Guide Products: BLK-DH2 Series and BLK-HD Series DVRs Please read this manual before using your software, and always follow the instructions for safety and proper use. Save

More information

HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App

HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App HP AppPulse Mobile Adding HP AppPulse Mobile to Your Android App Document Release Date: April 2015 How to Add HP AppPulse Mobile to Your Android App How to Add HP AppPulse Mobile to Your Android App For

More information

An Introduction to OSVR

An Introduction to OSVR An Introduction to OSVR What is OSVR? OSVR is an open-source software platform for VR/AR applications. OSVR provides an easy and standardized way to discover, configure and operate hundreds of devices:

More information

SAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page 108-10.

SAP NetWeaver Fiori. For more information, see Creating and enabling a trusted provider for Centrify on page 108-10. Chapter 108 Configuring SAP NetWeaver Fiori The following is an overview of the steps required to configure the SAP NetWeaver Fiori Web application for single sign-on (SSO) via SAML. SAP NetWeaver Fiori

More information

The Implementation of Face Security for Authentication Implemented on Mobile Phone

The Implementation of Face Security for Authentication Implemented on Mobile Phone The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,

More information

EUROPEAN COMMISSION. CASSANDRA Common assessment and analysis of risk in global supply chains

EUROPEAN COMMISSION. CASSANDRA Common assessment and analysis of risk in global supply chains EUROPEAN COMMISSION SEVENTH FRAMEWORK PROGRAMME THEME Monitoring and tracking of shipping containers SECURITY FP7-SEC-2010-3.2-1 GA No. 261795 CASSANDRA Common assessment and analysis of risk in global

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Android and OpenCV Tutorial

Android and OpenCV Tutorial Android and OpenCV Tutorial Computer Vision Lab Tutorial 26 September 2013 Lorenz Meier, Amaël Delaunoy, Kalin Kolev Institute of Visual Computing Tutorial Content Strengths / Weaknesses of Android Java

More information

This document is to explain how to setup Outlook to use our Cloud Based Exchange service.

This document is to explain how to setup Outlook to use our Cloud Based Exchange service. Introduction This document is to explain how to setup Outlook to use our Cloud Based Exchange service. Prerequisites Before we begin you will need; Your Cloud Exchange Email Address, The Password for your

More information

D6.1 GEEWHEZ Test plan

D6.1 GEEWHEZ Test plan D6.1 GEEWHEZ Test plan Coordinator: Zoomarine Italia S.p.A. Claudio Di Capua Research for the benefit of specific groups Project Start Date:1 st October 2011 Duration:24 months -1 Grant Agreement - 25

More information

Collaborative Open Market to Place Objects at your Service

Collaborative Open Market to Place Objects at your Service Collaborative Open Market to Place Objects at your Service D8.2.3.2 Training actions report Project Acronym Project Title COMPOSE Project Number 317862 Work Package WP8 Dissemination, Training, and Stakeholders

More information

How do I maintain my website with Ensemble CMS?

How do I maintain my website with Ensemble CMS? How do I maintain my website with Ensemble CMS? This tutorial introduces you to basic terms and concepts associated with using Ensemble CMS to manage your website. Ensemble CMS Ensemble CMS is a content

More information

Integration Overview. Web Services and Single Sign On

Integration Overview. Web Services and Single Sign On Integration Overview Web Services and Single Sign On Table of Contents Overview...3 Quick Start 1-2-3...4 Single Sign-On...6 Background... 6 Setup... 6 Programming SSO... 7 Web Services API...8 What is

More information

Centrify Mobile Authentication Services for Samsung KNOX

Centrify Mobile Authentication Services for Samsung KNOX Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android

Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android Xerox Mobile Link is a personal productivity app that connects your mobile phone and tablet to a Xerox Multifunction Printer (MFP). You

More information

NAS 221 Remote Access Using Cloud Connect TM

NAS 221 Remote Access Using Cloud Connect TM NAS 221 Remote Access Using Cloud Connect TM Access the files on your NAS remotely with Cloud Connect TM A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able

More information

NBT BANK MOBILE BANKING. How To Guide

NBT BANK MOBILE BANKING. How To Guide Table of Contents personal and business banking customers How to Enroll...3 Accessing and Using NBT Bank Mobile Banking...5 Welcome to the NBT Bank Mobile Banking Application...7 Using Mobile Deposit...8

More information

Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00

Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00 Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00 www.griaulebiometrics.com Brazil Phone: 55-19-3289-2108 USA Phone: (408) 490 3438 Fingerprint Identity Index Getting

More information

BONE Network of Excellence

BONE Network of Excellence SEVENTH FRAMEWORK PROGRAMME D03.1 Electronic Communication Tools Specification FP7-ICT-216863/UNIBO-UPC/R/PU/D03.1 Project Number: FP7-ICT-2007-1 216863 Project Title: Building the Future Optical Network

More information

D 8.2 Application Definition - Water Management

D 8.2 Application Definition - Water Management (FP7 609081) Date 31st July 2014 Version [1.0] Published by the Almanac Consortium Dissemination Level: Public Project co-funded by the European Commission within the 7 th Framework Programme Objective

More information

Getting Started with Android Development

Getting Started with Android Development Getting Started with Android Development By Steven Castellucci (v1.1, January 2015) You don't always need to be in the PRISM lab to work on your 4443 assignments. Working on your own computer is convenient

More information

YOUR INTERACTIVE SECURITY

YOUR INTERACTIVE SECURITY YOUR INTERACTIVE SECURITY MyFrontpoint.com: Setup & Features SECURITY THE WAY YOU WANT IT After your activation call, you ll receive your MyFrontpoint.com login and password via email. Log on at www.myfrontpoint.com.

More information

Centrify Mobile Authentication Services

Centrify Mobile Authentication Services Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

Identity and Access Management Solutions MWC 2016

Identity and Access Management Solutions MWC 2016 Identity and Access Management Solutions MWC 2016 The new EXPERIENCE to consume the digital world is our IDENTITY PROPOSAL EXPERIENCE the digital world EASILY, with TRUST and TRANSPARENCY I use y o ile

More information

Business Banking Customer Login Experience for Enhanced Login Security

Business Banking Customer Login Experience for Enhanced Login Security Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification

More information

Cloud Web-Based Operating System (Cloud Web Os)

Cloud Web-Based Operating System (Cloud Web Os) Cloud Web-Based Operating System (Cloud Web Os) Hesham Abusaimeh Department of Computer Science, Faculty of Information Technology, Applied Science University, Amman, 11931 Jordan. ABSTRACT The cloud computing

More information

How To Run A Hello World On Android 4.3.3 (Jdk) On A Microsoft Ds.Io (Windows) Or Android 2.7.3 Or Android 3.5.3 On A Pc Or Android 4 (

How To Run A Hello World On Android 4.3.3 (Jdk) On A Microsoft Ds.Io (Windows) Or Android 2.7.3 Or Android 3.5.3 On A Pc Or Android 4 ( Developing Android applications in Windows Below you will find information about the components needed for developing Android applications and other (optional) software needed to connect to the institution

More information

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric

More information

Android Environment SDK

Android Environment SDK Part 2-a Android Environment SDK Victor Matos Cleveland State University Notes are based on: Android Developers http://developer.android.com/index.html 1 2A. Android Environment: Eclipse & ADT The Android

More information

How to create an Expense Report through iexpense in the iphone Mobile App

How to create an Expense Report through iexpense in the iphone Mobile App How to create an Expense Report through iexpense in the iphone Mobile App 1. Before you can submit Expense Reports through the mobile app, you need to access iexpense through the web application to set

More information

1) SETUP ANDROID STUDIO

1) SETUP ANDROID STUDIO 1) SETUP ANDROID STUDIO This process takes approximately 15-20 Minutes dependent upon internet speed and computer power. We will only be covering the install on Windows. System Requirements Android Studio

More information

Cloud Control Panel (CCP) Billing User Guide

Cloud Control Panel (CCP) Billing User Guide Cloud Control Panel (CCP) Billing User Guide Version 1.0: 01.01.11 Copyright 2011 DNS Europe Ltd. All rights reserved. Cloud Control Panel (CCP) Billing User Guide v1.0 Table of Contents 1 Introduction

More information

The Smartest Way to Get Meetings Done

The Smartest Way to Get Meetings Done The Smartest Way to Get Meetings Done It is time to say goodbye to email and calendar hassle: Meetin.gs is the smartest way to meet. Get your meetings on the cloud and access them from any device. The

More information

ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07

ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07 ACTi NVR Config Converter User s Manual Version 1.0.0.17 2012/06/07 Legal Notice Disclaimer The information contained in this document is intended for general information purposes. ACTi Corporation shall

More information

How to set up Outlook Anywhere on your home system

How to set up Outlook Anywhere on your home system How to set up Outlook Anywhere on your home system The Outlook Anywhere feature for Microsoft Exchange Server 2007 allows Microsoft Office Outlook 2007 and Outlook 2003 users to connect to their Outlook

More information

COMPANIES REGISTRY. Third Party Software Interface Specification. (Part 1 Overview)

COMPANIES REGISTRY. Third Party Software Interface Specification. (Part 1 Overview) COMPANIES REGISTRY Third Party Software Interface Specification () of Integrated Companies Registry Information System Version 1.3 March 2014 The Government of the Hong Kong Special Administrative Region

More information

Android Environment SDK

Android Environment SDK Part 2-a Android Environment SDK Victor Matos Cleveland State University Notes are based on: Android Developers http://developer.android.com/index.html 1 Android Environment: Eclipse & ADT The Android

More information

FPT UNIVERSITY. Capstone Project

FPT UNIVERSITY. Capstone Project MINISTRY OF EDUCATION AND TRAINING FPT UNIVERSITY Capstone Project Online Event Organizing Company Management System Group Group Members Đoàn Minh Thiện 60130 Nguyễn Thanh Thống 60561 Mai Hoàng Trí Anh

More information

INTERNAL USE ONLY (Set it to white if you do not need it)

INTERNAL USE ONLY (Set it to white if you do not need it) APPLICATION NOTE How to Build Basler pylon C++ Applications with Free Microsoft Visual Studio Document Number: AW000644 Version: 03 Language: 000 (English) Release Date: 23 July 2015 INTERNAL USE ONLY

More information

CDVS-7000 Series Remote Software Users Guide

CDVS-7000 Series Remote Software Users Guide CDVS-7000 Series Remote Software Users Guide Crest Electronics, Inc. Version 12.1005 Remote Surveillance Program The remote surveillance program enables users of the Crest 7000 series DVRs to connect remotely

More information

EMC Documentum Content Services for SAP Repository Manager

EMC Documentum Content Services for SAP Repository Manager EMC Documentum Content Services for SAP Repository Manager Version 6.0 Installation Guide P/N 300 005 500 Rev A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com

More information

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange

More information

CA Service Desk Manager - Mobile Enabler 2.0

CA Service Desk Manager - Mobile Enabler 2.0 This Document is aimed at providing information about the (CA SDM) Mobile Enabler and mobile capabilities that is typically not available in the product documentation. This is a living document and will

More information

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license

More information

Saba Cloud. Overview of SSO for mobile applications

Saba Cloud. Overview of SSO for mobile applications Saba Cloud Overview of SSO for mobile applications Introduction 2 Published: 05/13/2014 Part Number: U-SEC-1 Database management system: TOC 3 Contents Chapter 1: SSO support by Saba Cloud mobile applications...5

More information

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

DESURBS Deliverable 3.1: Specification of mapping and visualization

DESURBS Deliverable 3.1: Specification of mapping and visualization DESURBS Deliverable 3.1: Specification of mapping and visualization Project full title: Designing Safer Urban Spaces Grant agreement no.: 261652 Lead beneficiary for Deliverable 3.1: Centre Internacional

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.

More information

Getting Started with ODM

Getting Started with ODM Getting Started with ODM Instructions for Attaching the ODM Blank Schema Database to an Instance of Microsoft SQL Server 2005 Jeffery S. Horsburgh 1 5-3-2008 Introduction This document describes how to

More information

Draft Technical Specifications for Multilevel Security Authentication Device

Draft Technical Specifications for Multilevel Security Authentication Device Proposed QRs/Tech Specification for Multilevel Security Authentication Device is given below for inviting valuable comments/suggestions from Vendors, suppliers and OEMs. Draft Technical Specifications

More information