Oracles Mobiler Hintergrund
|
|
- Lee Richard
- 8 years ago
- Views:
Transcription
1 Startseite Anya Elis Manager Business Development Wireless Deutschland GmbH Oracles Mobiler Hintergrund ,5 Millionen Mobile Benutzer 2000 Wireless Application Hosting Die Ersten 1999 Oracle9i Application Server Wireless Edition 1999 WAP Portal in Europa 1998 SMS Portal in Europa 1997 Prototyp Lab mit Telia 1996 Oracle8i Lite - 1MB Mobile Datenbank 1995 Personal Oracle7 - Mobile Database Page 1 1
2 Oracle9i Application Server Wireless SMS G/W TEXT Jede WEB Site Personalisiertes Portal WAP G/W WML XML Quellen Dynamische Inhalte- Transformation für alle Geräte XML basierte Technologie HTML G/W Tiny HTML HDML G/W HDML Firmen RDBMs Application Server HTML Any ML Jedes ML Gerät Oracle9iAS Wireless Jedes Gerät Nokia Motorola Ericsson Palm RIM Pagers Blackberry Any Network.. Jeder Browser Jedes Gateway Jede Markup Jede Applikation S.E.S.A. Nokia Motorola Ericsson Phone.com CMG Tantau Infinity... HTML XML HDML WML TinyHTML TTML CHTML KML VoXML VoiceXML... Geräteunabhängig Personalisierbar Positionsbasiert Event-gesteuert Sicher Jeder Inhalt Jede Web Site Jede HTML Page Jede XML Seite Jede Datenbank Jedes Servlet Jedes JSP Jedes XSP Jede ... Page 2 2
3 Oracle Wireless Services WML SMS Transformer Adapter XML HDML Personalisierungs Portal Runtime (User, Session Management) Service Manager TTML Oracle9i Oracle9i AS User Präferenzen Geräte te-information Jede Web Site, DB, Enterprise App, System Oracle9iAS Wireless Option : die einzige vollständig integrierte Lösung, um Multichannel Internet Anwendungen zu entwickeln und einzusetzen Anwendungen nur einmal entwickeln Vorhandene Inhalte einsetzen Personalisierte und ortsabhängige Dienste Page 3 3
4 Oracle9iAS Wireless Edition Marktdurchdringung Grosse Carrier Sprint PCS, Telefonica Moviles, Telecom Italia Mobile andere inkl. 9/12 Top Europäischen Carrier Portale/ASPs LycosMobile (Asia), Telefonica, Telia 8-10 andere Corporate DrugEmporium, Overseas Union Bank, DBS Bank andere Oracle Location Based Services Spatial Einfach mit Oracle9i Application Server Wireless und 9i Spatial: Aware Services Nächstes Restaurant, Autowaschanlage, Verkehrshilfen Lokalisationsabhängige Services Mein Wetter Meine Stadt Events Car Internet Mobile Services Verkehr, Stadtpläne, Routing... Page 4 4
5 Oracle9iAS Wireless Partner Content Management Calendering Scheduling Implementation Services Wireless Edition Oracle9i APPLICATION SERVER Location Personalization Payment Advertising Billing E-Commerce Version 2.0 Personal Information Management Mobile Mobile Directory Mobile Address Book Mobile Calendar Instant Messaging Document Management Unified Messaging Basierend auf Standard-Protokollen M-Commerce M-Wallet Form Filler Payment Processing back Page 5 5
6 Beispiel Partner: Eine vollständige Plattform für Lösungen über mobiles und festes Internet mit dem höchsten verfügbaren Sicherheits-Standard Public Key Infrastruktur wird zum Teil der Entwicklungsumgebung. Internationale Standards werden unterstützt. Für SIM-Karten und Smart Cards + + PayCircle HP, Lucent, Oracle, Siemens und Sun bilden ein Konsortium zur Standardisierung mobiler Zahlung und Unterstützung der weltweiten Verbreitung von M-Commerce. PayCircle Konsortium wird offene Schnittstellen für mobiles Bezahlen entwickeln, verwenden und fördern. Non-Profit Organisation Mitgliedschaft für alle Aktiven im Mobile Payment Markt, wie Anwendungsentwickler Payment Service Provider Händler Inhalteanbieter Hersteller von Payment Systemen Hersteller fürr mobile Infrastruktur und mobile Endgeräte Netzbetreiber Banken & Kreditkartenfirmen Page 6 6
7 Trusted Operator PKI integration in Oracle 9i AS Wireless Petter Bergström SmartTrust Digital ID SmartTrust Fact Sheet History Business Offices Ownership Created by the mergers of Sonera SmartTrust, Across Wireless and id2 Technologies in operations since 1991 Infrastructure software for managing and securing e-services Sweden, Finland, UK, Germany, Belgium, Italy, Spain, Malaysia, Hong Kong, Singapore, US ~290 full-time employees Currently 100% owned by Sonera Corporation (NASDAQ: SNRA) Products Revenue Customers Delivery platform for mobile operators PKI solutions with unique smart card support million million million 2002FC 49 million, EBITDA positive 70+ mobile operator customers and 160+ corporate customers in 43 countries 1
8 SmartTrust s Current Market Position Established Mobile Operator Franchise 60+ delivery platform installations 67 million Service and Device Management end-user licenses ~75% market share in SDM 15 million Wireless Internet Gateways end-user licenses sold All major SIM-cards inter-operate with SmartTrust technology Strong Presence in Digital Identity Technology >50% market share in Trust Service Provider segment in Europe (high-end smart card based PKI security) 1,5 million licenses SmartTrust Personal 9 smart card brands supported covering market share >75% 40+ CM installations Source: Dataquest, SmartTrust management estimates Customer Examples for Digital ID Segment Customer examples Trust Service Providers Bank/FI Telecom Government &Corporate 2
9 Product overview Content Provider Personal Internet HTTPS (SSL) Security Center SIM/UICC with Wireless Internet Browser (WIB) & signature plug-ins GSM/GPRS UMTS WLAN (11,5 G) Delivery Platform Mobile Operator Directory Service Certificate Manager OCSP Responder Trust Service Provider Mobile Digital ID Partner(s) The Challenge On the Internet nobody knows you re a dog. 3
10 The Security Trend (High level) One-time password Certificates / PKI Trend In a token On a Smart Card Complex installation Complex usage Password On diskette On paper list On hard disk 1 4 Unlimited No. of applications PKI Products from SmartTrust Certification Authority SmartTrust Certificates & Certificate Manager revocation information Certificate Repository Directory with LDAP protocol Certificates PKI cards Revocation information (e.g. CRLs) PKI-enabling software SmartTrust Personal Secure connection PKI-enabling software SmartTrust Security Center SmartTrust Servant OCSP End-users (subjects) End-entities 4
11 PKI Security Users Banks and financial institutions Government Telecom Large Enterprises Secure & file encryption with standard products Applications Extranet/intranet, VPN, remote access, Single Sign On Internet banking/e-commerce document processing, workflow SmartTrust products CA system Client side PKI Server side PKI Standards RSA PKCS SSL S/MIME SEIS X.509 LDAP SET A Typical Web Solution SmartTrust Certificate Manager Certificate and CRL distribution Directory Certificate distribution CLIENT Web Browser SmartTrust Personal Authentication & digital signatures including extensive support for for Smart Cards and andsoft softtokens SSL version 3.0 CRL retrieval/checking SERVER WWWserver SmartTrust Servant Check CRL Verify signature Parse signature Parse certificate Application 5
12 The Mobile Ecosystem Mobile Ecosystem Co-operation by different types of service providers to offer mobile e-services to end users using the mobile terminal as a trusted personal device Infrastructure/ Technology Providers Mobile Operator Billing Relationship Provides mobile subscriber management, access and VAS. Currently in hub position in the mobile ecosystem. Media Company Provides information and content (e.g., music, news) Provides products/services for sale (e.g. software, tickets) Retailer/ Merchant End-User Financial Institution Facilitating savings, credit, payments Provides corporate IT services (e.g., ERP, Intranet, ) Corporate/ Enterprise Trust Service Provider Provides digital identities and trust services (e.g., authentication) Trusted Operator A Trusted Operator is an operator that achieves acceptance of the mobile phone as a trusted personal device The mobile phone is the most deployed device for security tokens in the world! 6
13 Addressing the entire market? Dedicated devices Special tokens WAP Varying signature support Trusted Operator Supports tokens (and potentially seamlessly replaces tokens) Supports and enhances WAP Multi browsing environment Trusted Operator - Services and Revenue Digital Signatures Orders, Payments Authentication VPN connection Wallet Services Web-login Confidentiality Account, Stock, Voting information One-time passwords Assumption: subscribers, avg. 20 extra messages/user/month, 0.04 /message Decrease churn by 1% ARPU of 500 /year Certificate fee 3 /year (30%) New Services Revenue in msg/month in cert/year Reduced Churn churn in retained revenue/year 7
14 Oracle9i Application Server Wireless and SmartTrust HTML Oracle 9iAS WE Client browsers and signature plug-ins P7 Web server P7, ISO9797 Adapters Content: XML, HTML, WML, DB etc... DP5 WIG WIG WML P7, ISO9797 Transformers XML Sign tag /ACI SDK /Oracle SDK HTML WIG WML XSLT New in ias WE v2 Available at partner web P7 Content transformation Harmonized signature interface Payment clearing with ACI ACI ACI payment gw gw Servant OCSP Security Center Systems Architecture HTML P7 DP5 DP5 WIG WIG WIG WML P7, ISO9797 Web server Oracle 9iAS Wireless Adapters P7, ISO9797 XML Sign tag /Oracle SDK HTML P7 Servant Servant OCSP OCSP Security Security Center Center Wireless Wireless Certificate Certificate Enrollment Enrollment Server Server Certificate Certificate Manager Manager Oracle OID X500 8
15 Example: B2C using wireless PKI Request signature Sign Transaction use private key on SIM Telecom Operator Notify Merchant and process payment Bank Request order confirmation Place Order, specify mobile payment Solution Highlights A complete platform to implement solutions over the mobile and fixed Internet using the highest security standard available. Any content or application becomes available on any device. Create Once Publish Everywhere Personalized Content Secure Portal Services Harmonized Signature Interface Leverage SMS channel Public Key Infrastructure becomes a part of the development environment. International standards are supported. Digital certificates can be stored on any device: smart card, SIM-card or as a soft certificate. Certificate issuing and management 9
16 More information or Background What is required is the equivalent to: 10
17 The four elements of security Confidentiality Integrity Eavesdropping Modification Authentication Non-repudiation Faked identify Not sent Claims Receipt PKI - Public Key Infrastructure Juliet s Private Key Romeo s Private Key Juliet s Public Key Romeo s Public Key 11
18 Signing the message Meet me at the balcony, Juliet Clear Text Message Juliet s Private Key Sign Signed data Meet me at the balcony, xa7a1 Encrypting it Meet me at the balcony, xa7a1 Signed data Romeo s Public Key Encrypt Encrypted and signed data 8duqhj482aq29#1ej&2aVhd2# 2 Deliver to Romeo... 12
19 Decrypting it 8duqhj482aq29#1ej&2aVhd2# 2 Encrypted and signed data Romeo s Private Key Decrypt Signed data Meet me at the balcony, xa7a1 Checking the signature Meet me at the balcony, xa7a1 Signed data Juliet s Public Key Verify Clear Text Message Meet me at the balcony, Juliet 13
White Paper. (Wireless) Enterprise PC Security. Author: Sten Lannerstrom, SmartTrust. Document number: MPM02:0015 Revision: A
Author: Sten Lannerstrom, SmartTrust (Abstract) From a security perspective the traditional handset could become a personal trusted device (PTD) as its internal structure already carries a smart card capable
More informationHow To Use Smarttrust Wib On A Sim Card On A Mobile Phone
Application Partner Program Technology Introduction A condensed tutorial on applications in SmartTrust s technical context July 2009 version SmartTrust, your partner in VAS SmartTrust Wib is the world
More informationMobile Commerce. Contents
Mobile Commerce The new commercial environment ivazquez@eside.deusto.es Faculty of Engineering Contents What is m-commerce? Advantages Enabling technologies services Forecasts Conclussions 1 What is m-commerce?
More informationAn Introduction to Entrust PKI. Last updated: September 14, 2004
An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In
More informationTeleTrusT European Bridge CA Status and Outlook
TeleTrusT European Bridge CA Status and Outlook TeleTrusT Workshop, Saarbrücken, 2010-06-11 Dr. Guido von der Heidt, Siemens AG Copyright Siemens AG 2010. All rights reserved. Secure (E-Mail) Communication
More informationPublic-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
More informationDigital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
More informationAxway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
More informationBenutzerfreundlich, tiefe Betriebskosten und hohe Sicherheit. Warum sich diese Ziele nicht widersprechen müssen
Benutzerfreundlich, tiefe Betriebskosten und hohe Sicherheit. Warum sich diese Ziele nicht widersprechen müssen Jean Paul Kölbl CEO IT-Secure.com AG Total access security Heutige Situation Kostendruck
More informationCitrix Enterprise Mobility more than just device management (MDM)
Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer
More informationCS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
More informationHow To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
More information<Insert Picture Here> Oracle Direct Potsdam
ORACLE BPEL Process Manager Dr. Jens Hündling Senior Systemberater Oracle Direct Potsdam Java User Group Saxony Technische Universität Chemnitz 24. Juni 2010 The following is intended
More informationThe Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority
The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority Dr. Ali M. Al-Khouri Emirates Identity Authority, Abu Dhabi, United Arab Emirates Abstract Digital
More informationWhite Paper: Managing Security on Mobile Phones
White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile
More informationHKUST CA. Certification Practice Statement
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of
More informationOracle Internet Messaging - UM Option
Oracle Internet Messaging - UM Option Prepared by Oracle Business Development - NEMS Creation Date: Friday, July 17th, 1998 Last Updated: Friday, July 24th, 1998 Copyright (C) 1998 Oracle Corporation All
More informationAdvanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
More informationOpen Text Social Media. Actual Status, Strategy and Roadmap
Open Text Social Media Actual Status, Strategy and Roadmap Lars Onasch (Product Marketing) Bernfried Howe (Product Management) Martin Schwanke (Global Service) February 23, 2010 Slide 1 Copyright Open
More informationMobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
More informationWealth Management System
Wealth Management System Clients in the new economy demand straight answers. With ubiquitous information on the Internet and an around-the-clock global financial market accessible by pagers, email, mobile
More informationViSolve Open Source Solutions
ViSolve Open Source Solutions Best-In-Class Authentication and Authorization Solutions & Services ViSolve Inc. ViSolve Securing Digital Assets Contents Security Overview Security Concerns Security Needs
More informationNCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and
More informationDeployment-Optionen für den optimierten Desktop. Hans.Schermer@citrix.com Senior Systems Engineer, Citrix Systems
Deployment-Optionen für den optimierten Desktop Hans.Schermer@citrix.com Senior Systems Engineer, Systems V-Alliance & Microsoft = V-Alliance Zusammenarbeit in allen Bereichen der Server-, Anwendungs -
More informationIBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.
IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services Combine resources for one complete online business security solution. Big e-business opportunities demand security to match
More informationGlobal eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
More informationProject Chase Manhattan
T-NetSix Enon Corporation Project Chase Manhattan How T-NetSix Enon Corporation created new innovative mobile banking solution for Chase Manhattan bank Company background: T-NetSix Enon is a IT services
More informationCommuniqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform
Communiqué 4 Standardized Communiqué 4 - fully implementing the JCR (JSR 170) Content Repository Standard, managing digital business information, applications and processes through the web. Communiqué
More informationCA Computer Associates. Nils Meyer CA Computer Associates GmbH Hamburg
CA Computer Associates Nils Meyer CA Computer Associates GmbH Hamburg Agenda CA Das Unternehmen CA Die Geschichte CA Die Softwarelösungen Diskussion CA Das Unternehmen CA Computer Associates International
More informationBreeder documents closing the gap in the identity management chain. Christian Wagner VP SDM Government Washington, March 23, 2015
Breeder documents closing the gap in the identity management chain Christian Wagner VP SDM Government Washington, March 23, 2015 INTERNET OF THINGS IS RISING Five-Year (2014-2019) CAGR 57% 2014, Business
More informationRSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
More informationDigital Signatures and Interoperability
Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000
More information<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008
Oracle Security Developer Tools (OSDT) August 2008 Items Introduction OSDT 10g Architecture Business Benefits Oracle Products Currently Using OSDT 10g OSDT 10g APIs Description OSDT
More informationThe Costs of Managed PKI:
The Costs of Managed PKI: In-House Implementation of PKI vs. Traditional Managed PKI vs. ON-Demand PKI A TC TrustCenter Whitepaper Last Updated: February 2008 Introduction Until recently, organizations
More informationPublic Key Infrastructure for a Higher Education Environment
Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware
More informationWeb and e-business Technologies
ActivePotato Corporation www.activepotato.com Web and e-business Technologies By Rohit Chugh rohit.chugh@activepotato.com For the IEEE Ottawa Chapter June 2, 2003 2003 by Rohit Chugh 1 Agenda Web Technologies
More informationExploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
More informationRSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
More informationQualified mobile electronic signatures: Possible, but worth a try?
Qualified mobile electronic signatures: Possible, but worth a try? Lothar Fritsch 1, Johannes Ranke 2, Heiko Rossnagel 1 Interest level of audience: 3 - for application developers (interested in IT security)
More informationAchieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should
More informationOracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004
Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory
More informationIntegrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation
Integrating Biometrics into the Database and Application Server Infrastructure Shirley Ann Stern Principal Product Manager Oracle Corporation 1 Agenda! Introduction Importance of the infrastructure Role
More informationDigicomp Microsoft Evolution Day 2015 1. MIM 2016 Oliver Ryf. Partner:
1 MIM 2016 Oliver Ryf Partner: 2 Agenda Begrüssung Vorstellung Referent PowerShell Desired State Configuration F&A Weiterführende Kurse 3 Vorstellung Referent Seit 1991 IT-Trainer 1995 MCSE und MCT Seit
More informationFAQs for Two-factor Authentication
FAQs for Two-factor Authentication Two-factor Authentication 1. What is two-factor authentication? Two-factor authentication is an authentication scheme that increases online security by relying on a combination
More informationUnderstanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH mickobrien137@hotmail.co.uk, george.weir@cis.strath.ac.uk
More informationBlackBerry Enterprise Solution
BlackBerry Enterprise Solution The leading wireless solution for connecting mobile users to the customers, colleagues and information that drive business. BlackBerry Enterprise Solution Mobilize Your Email,
More informationBlackBerry Enterprise Solution and RSA SecurID
Technology Overview BlackBerry Enterprise Solution and RSA SecurID Leveraging Two-Factor Authentication to Provide Secure Access to Corporate Resources Table of Contents Executive Summary 3 Empowering
More information70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
More informationA secure, economic infrastructure for signing of web based documents and financial affairs Overview of a server based, customer-friendly approach.
1 of 8 15.03.2004 14:09 Issue January 2002 A secure, economic infrastructure for signing of web based documents and financial affairs Overview of a server based, customer-friendly approach. Lothar Fritsch,
More informationSecure Mobile POS System
A point of sale application for secure financial transitions in a mobile business enviroment KAZI MASUM SADIQUE KTH Information and Communication Technology Master of Science Thesis Stockholm, Sweden 2013
More informationWhat is an SSL Certificate?
Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert
More informationRSA Security RSA Keon Certificate Authority PKI Product
Kristen Noakes-Fry Product Report 1 August 2003 RSA Security RSA Keon Certificate Authority PKI Product Summary RSA Keon Certificate Authority a PKI platform for Internet and e-commerce applications serves
More informationprefer to maintain their own Certification Authority (CA) system simply because they don t trust an external organization to
If you are looking for more control of your public key infrastructure, try the powerful Dogtag certificate system. BY THORSTEN SCHERF symmetric cryptography provides a powerful and convenient means for
More informationLife is now. www.vodafone.com.mt
BlackBerry Enterprise Solution Mobilise Your E-mail and Enterprise Applications The leading wireless solution for connecting mobile users to the customers, colleagues and information that drive business.
More informationGovernment Service Bus
Government Service Bus The GSB (Government Service Bus) is intended to become the central platform of integration and services for the provision of government electronic services and transactions, and
More informationTest Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability. Version 1.0.3
Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability Version 1.0.3 Prepared for: Department of Defense (DoD) PKI August 27, 2008 Page 1 Table of
More informationPart III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-a Contents Part III-a Public-Key Infrastructure (PKI) Definition of a PKI and PKI components PKI Trust Models Digital Certificate, X.509 Certificate Management and Life Cycle Public Key Infrastructure
More informationBlackBerry Enterprise Solution
BlackBerry Enterprise Server BlackBerry Enterprise Solution The leading wireless solution for connecting mobile users to the customers, colleagues and information that drive business. Mobilize your email,
More informationCertification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
More informationCompany presentation SHARES - CENKOS Innovators & Investors FORUM 29 January 2013. globoplc.com
Company presentation SHARES - CENKOS Innovators & Investors FORUM 29 January 2013 2 Introduction GLOBO is an international leader and technology innovator in the mobile consumer and enterprise application
More informationIntroducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI
Introducing AirWatch by VMware: Enterprise Mobility Simplified Menny Tsarfaty EUC Business Specialist MEDI Market already changed End-User Computing Vision PCs, Laptops Thin Clients Tablets, Smartphones
More informationSecurity MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved.
Security MWC 2014 2013 Nokia Solutions and Networks. All rights reserved. Security Ecosystem overview Partners Network security demo + End-user security demo + + + + NSN end-to-end security solutions for
More informationMobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
More information& corporate mobile value added services
& corporate mobile value added services Case Juha Hä kä mies Juha Matti Hä kä mies Licentiate of Technology (Helsinki University of Technology) Married 2 children (3 years daughter & 5 years son) Clarinet
More informationOracle9i Application Server: Options for Running Active Server Pages. An Oracle White Paper July 2001
Oracle9i Application Server: Options for Running Active Server Pages An Oracle White Paper July 2001 Oracle9i Application Server: Options for Running Active Server Pages PROBLEM SUMMARY...3 INTRODUCTION...3
More informationInstallation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
More informationMobile Banking. Product Overview
Mobile Banking Product Overview financial services & retail enterprise internet content providers public sector telecommunications > PRODUCT transport Introduction Mobile phones have become an integral
More informationThe Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should
More informationAnyWeb AG 2008 www.anyweb.ch
HP SiteScope (End-to-End Monitoring, System Availability) Christof Madöry AnyWeb AG ITSM Practice Circle September 2008 Agenda Management Technology Agentless monitoring SiteScope in HP BTO SiteScope look
More informationSingle Sign-On Access Management A Technical Framework on Access Management Systems
Single Sign-On Access Management A Technical Framework on Access Management Systems Polaris Software Lab Ltd., 766, Anna Salai, Chennai, INDIA 600 006 Single Sign-On Access Management Service This paper
More informationIdentity & Privacy Protection
Identity & Privacy Protection An Essential Component for a Federated Access Ecosystem Dan Turissini - CTO, WidePoint Corporation turissd@orc.com 703 246 8550 CyberSecurity One of the most serious economic
More informationProtect Everything: Networks, Applications and Cloud Services
Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active
More informationAlphaTrust PRONTO Enterprise Platform Product Overview
AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform is server-based software that automates the creation of legally enforceable, permanent business records that
More informationWhite Paper. Bearer Independent Protocol (BIP)
White Paper Bearer Independent Protocol (BIP) - 2 - Contents 1 Executive summary...4 2 Introduction...5 3 Solution description...5 3.1 Standards compliance...5 3.2 Interface architecture...6 3.3 Data carriers...9
More informationMobile Web Services Workshop 行 動 式 網 際 網 路 服 務 平 臺. 工 研 院 電 通 所 網 際 網 路 軟 體 技 術 組 鄭 仁 傑 Roger Jen-Chieh Cheng rogercheng@itri.org.
Mobile Web Services Workshop 行 動 式 網 際 網 路 服 務 平 臺 工 研 院 電 通 所 網 際 網 路 軟 體 技 術 組 鄭 仁 傑 Roger Jen-Chieh Cheng rogercheng@itri.org.tw 1 Agenda Evolution (What hava happened?) Web Application Mobile Internet
More informationBEA Systems Business Problem: Der x-business Marktplatz Technologische Lösung: Eine E-Business Platform Produkte für die Lösung Software/Information Behörden Staat Urlaub Technische Information t-, m-,
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
More informationHow To Run A Server On A Linux Computer (For Free) On A Microsoft Server (For Linux) On An Ipad Or Ipad (For Microsoft) On Free Software (For Ubuntu) On Your Computer Or Ipa (
The real Way of Open Source FOSS Group AG, Hauptstrasse 91, CH 4147 Aesch FOSS Group GmbH, Bismarckallee 9, 79098 Freiburg 2008 by FOSS Group Die FOSS Group ist ein Zusammenschluss von hochkarätigen Free
More informationEntrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
More informationPKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013
2013 PKI Made Easy: Managing Certificates with Dogtag Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013 Agenda What is PKI? What is Dogtag? Installing Dogtag Interacting with Dogtag using REST Future
More informationTitle Page. Hosted Payment Page Guide ACI Commerce Gateway
Title Page Hosted Payment Page Guide ACI Commerce Gateway Copyright Information 2008 by All rights reserved. All information contained in this documentation, as well as the software described in it, is
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationSecure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
More information- Was gibt es Neues? - Mobile Update
- Was gibt es Neues? - Mobile Update Volker Linz Systemberater, Oracle E-Mail: volker.linz@oracle.com +++ Bitte wählen Sie sich in die Telefonkonferenz entweder mit 0800/6648515 oder aus dem Mobilfunknetz
More informationPublic Key Infrastructure. A Brief Overview by Tim Sigmon
Public Key Infrastructure A Brief Overview by Tim Sigmon May, 2000 Fundamental Security Requirements (all addressed by PKI) X Authentication - verify identity of communicating parties X Access Control
More informationOFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
More information> Please fill your survey to be eligible for a prize draw. Only contact info is required for prize draw Survey portion is optional
Web Access Management May 2008 CA Canada Seminar > Please fill your survey to be eligible for a prize draw Only contact info is required for prize draw Survey portion is optional > How to Transform Tactical
More informationEffiziente Kundenbetreuung auch von unterwegs: SAP CRM Sales. Michael Wallenczus, SAP (Schweiz) AG 17. April 2012
Effiziente Kundenbetreuung auch von unterwegs: SAP CRM Sales Michael Wallenczus, SAP (Schweiz) AG 17. April 2012 ROADMAP & SPECIFICATION DISCLAIMER This document outlines our general product direction
More informationData Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology
Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration
More informationAuthentication. Authentication in FortiOS. Single Sign-On (SSO)
Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication
More informationMobile Devices: Server and Management Lesson 02 Application Servers Part 1
Mobile Devices: Server and Management Lesson 02 Application Servers Part 1 Oxford University Press 2007. All rights reserved. 1 Application server Software, which executes at a server and serves the application-level
More informationRole Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationUsing Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationUser Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3
User Authentication FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook User Authentication v3 16 December 2011 01-433-122870-20111216 Copyright 2011 Fortinet, Inc. All rights reserved. Contents and
More informationFrost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample
Frost & Sullivan http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm EST
More informationSAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden
More informationSymantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationNCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access
More information