Oracles Mobiler Hintergrund

Size: px
Start display at page:

Download "Oracles Mobiler Hintergrund"

Transcription

1 Startseite Anya Elis Manager Business Development Wireless Deutschland GmbH Oracles Mobiler Hintergrund ,5 Millionen Mobile Benutzer 2000 Wireless Application Hosting Die Ersten 1999 Oracle9i Application Server Wireless Edition 1999 WAP Portal in Europa 1998 SMS Portal in Europa 1997 Prototyp Lab mit Telia 1996 Oracle8i Lite - 1MB Mobile Datenbank 1995 Personal Oracle7 - Mobile Database Page 1 1

2 Oracle9i Application Server Wireless SMS G/W TEXT Jede WEB Site Personalisiertes Portal WAP G/W WML XML Quellen Dynamische Inhalte- Transformation für alle Geräte XML basierte Technologie HTML G/W Tiny HTML HDML G/W HDML Firmen RDBMs Application Server HTML Any ML Jedes ML Gerät Oracle9iAS Wireless Jedes Gerät Nokia Motorola Ericsson Palm RIM Pagers Blackberry Any Network.. Jeder Browser Jedes Gateway Jede Markup Jede Applikation S.E.S.A. Nokia Motorola Ericsson Phone.com CMG Tantau Infinity... HTML XML HDML WML TinyHTML TTML CHTML KML VoXML VoiceXML... Geräteunabhängig Personalisierbar Positionsbasiert Event-gesteuert Sicher Jeder Inhalt Jede Web Site Jede HTML Page Jede XML Seite Jede Datenbank Jedes Servlet Jedes JSP Jedes XSP Jede ... Page 2 2

3 Oracle Wireless Services WML SMS Transformer Adapter XML HDML Personalisierungs Portal Runtime (User, Session Management) Service Manager TTML Oracle9i Oracle9i AS User Präferenzen Geräte te-information Jede Web Site, DB, Enterprise App, System Oracle9iAS Wireless Option : die einzige vollständig integrierte Lösung, um Multichannel Internet Anwendungen zu entwickeln und einzusetzen Anwendungen nur einmal entwickeln Vorhandene Inhalte einsetzen Personalisierte und ortsabhängige Dienste Page 3 3

4 Oracle9iAS Wireless Edition Marktdurchdringung Grosse Carrier Sprint PCS, Telefonica Moviles, Telecom Italia Mobile andere inkl. 9/12 Top Europäischen Carrier Portale/ASPs LycosMobile (Asia), Telefonica, Telia 8-10 andere Corporate DrugEmporium, Overseas Union Bank, DBS Bank andere Oracle Location Based Services Spatial Einfach mit Oracle9i Application Server Wireless und 9i Spatial: Aware Services Nächstes Restaurant, Autowaschanlage, Verkehrshilfen Lokalisationsabhängige Services Mein Wetter Meine Stadt Events Car Internet Mobile Services Verkehr, Stadtpläne, Routing... Page 4 4

5 Oracle9iAS Wireless Partner Content Management Calendering Scheduling Implementation Services Wireless Edition Oracle9i APPLICATION SERVER Location Personalization Payment Advertising Billing E-Commerce Version 2.0 Personal Information Management Mobile Mobile Directory Mobile Address Book Mobile Calendar Instant Messaging Document Management Unified Messaging Basierend auf Standard-Protokollen M-Commerce M-Wallet Form Filler Payment Processing back Page 5 5

6 Beispiel Partner: Eine vollständige Plattform für Lösungen über mobiles und festes Internet mit dem höchsten verfügbaren Sicherheits-Standard Public Key Infrastruktur wird zum Teil der Entwicklungsumgebung. Internationale Standards werden unterstützt. Für SIM-Karten und Smart Cards + + PayCircle HP, Lucent, Oracle, Siemens und Sun bilden ein Konsortium zur Standardisierung mobiler Zahlung und Unterstützung der weltweiten Verbreitung von M-Commerce. PayCircle Konsortium wird offene Schnittstellen für mobiles Bezahlen entwickeln, verwenden und fördern. Non-Profit Organisation Mitgliedschaft für alle Aktiven im Mobile Payment Markt, wie Anwendungsentwickler Payment Service Provider Händler Inhalteanbieter Hersteller von Payment Systemen Hersteller fürr mobile Infrastruktur und mobile Endgeräte Netzbetreiber Banken & Kreditkartenfirmen Page 6 6

7 Trusted Operator PKI integration in Oracle 9i AS Wireless Petter Bergström SmartTrust Digital ID SmartTrust Fact Sheet History Business Offices Ownership Created by the mergers of Sonera SmartTrust, Across Wireless and id2 Technologies in operations since 1991 Infrastructure software for managing and securing e-services Sweden, Finland, UK, Germany, Belgium, Italy, Spain, Malaysia, Hong Kong, Singapore, US ~290 full-time employees Currently 100% owned by Sonera Corporation (NASDAQ: SNRA) Products Revenue Customers Delivery platform for mobile operators PKI solutions with unique smart card support million million million 2002FC 49 million, EBITDA positive 70+ mobile operator customers and 160+ corporate customers in 43 countries 1

8 SmartTrust s Current Market Position Established Mobile Operator Franchise 60+ delivery platform installations 67 million Service and Device Management end-user licenses ~75% market share in SDM 15 million Wireless Internet Gateways end-user licenses sold All major SIM-cards inter-operate with SmartTrust technology Strong Presence in Digital Identity Technology >50% market share in Trust Service Provider segment in Europe (high-end smart card based PKI security) 1,5 million licenses SmartTrust Personal 9 smart card brands supported covering market share >75% 40+ CM installations Source: Dataquest, SmartTrust management estimates Customer Examples for Digital ID Segment Customer examples Trust Service Providers Bank/FI Telecom Government &Corporate 2

9 Product overview Content Provider Personal Internet HTTPS (SSL) Security Center SIM/UICC with Wireless Internet Browser (WIB) & signature plug-ins GSM/GPRS UMTS WLAN (11,5 G) Delivery Platform Mobile Operator Directory Service Certificate Manager OCSP Responder Trust Service Provider Mobile Digital ID Partner(s) The Challenge On the Internet nobody knows you re a dog. 3

10 The Security Trend (High level) One-time password Certificates / PKI Trend In a token On a Smart Card Complex installation Complex usage Password On diskette On paper list On hard disk 1 4 Unlimited No. of applications PKI Products from SmartTrust Certification Authority SmartTrust Certificates & Certificate Manager revocation information Certificate Repository Directory with LDAP protocol Certificates PKI cards Revocation information (e.g. CRLs) PKI-enabling software SmartTrust Personal Secure connection PKI-enabling software SmartTrust Security Center SmartTrust Servant OCSP End-users (subjects) End-entities 4

11 PKI Security Users Banks and financial institutions Government Telecom Large Enterprises Secure & file encryption with standard products Applications Extranet/intranet, VPN, remote access, Single Sign On Internet banking/e-commerce document processing, workflow SmartTrust products CA system Client side PKI Server side PKI Standards RSA PKCS SSL S/MIME SEIS X.509 LDAP SET A Typical Web Solution SmartTrust Certificate Manager Certificate and CRL distribution Directory Certificate distribution CLIENT Web Browser SmartTrust Personal Authentication & digital signatures including extensive support for for Smart Cards and andsoft softtokens SSL version 3.0 CRL retrieval/checking SERVER WWWserver SmartTrust Servant Check CRL Verify signature Parse signature Parse certificate Application 5

12 The Mobile Ecosystem Mobile Ecosystem Co-operation by different types of service providers to offer mobile e-services to end users using the mobile terminal as a trusted personal device Infrastructure/ Technology Providers Mobile Operator Billing Relationship Provides mobile subscriber management, access and VAS. Currently in hub position in the mobile ecosystem. Media Company Provides information and content (e.g., music, news) Provides products/services for sale (e.g. software, tickets) Retailer/ Merchant End-User Financial Institution Facilitating savings, credit, payments Provides corporate IT services (e.g., ERP, Intranet, ) Corporate/ Enterprise Trust Service Provider Provides digital identities and trust services (e.g., authentication) Trusted Operator A Trusted Operator is an operator that achieves acceptance of the mobile phone as a trusted personal device The mobile phone is the most deployed device for security tokens in the world! 6

13 Addressing the entire market? Dedicated devices Special tokens WAP Varying signature support Trusted Operator Supports tokens (and potentially seamlessly replaces tokens) Supports and enhances WAP Multi browsing environment Trusted Operator - Services and Revenue Digital Signatures Orders, Payments Authentication VPN connection Wallet Services Web-login Confidentiality Account, Stock, Voting information One-time passwords Assumption: subscribers, avg. 20 extra messages/user/month, 0.04 /message Decrease churn by 1% ARPU of 500 /year Certificate fee 3 /year (30%) New Services Revenue in msg/month in cert/year Reduced Churn churn in retained revenue/year 7

14 Oracle9i Application Server Wireless and SmartTrust HTML Oracle 9iAS WE Client browsers and signature plug-ins P7 Web server P7, ISO9797 Adapters Content: XML, HTML, WML, DB etc... DP5 WIG WIG WML P7, ISO9797 Transformers XML Sign tag /ACI SDK /Oracle SDK HTML WIG WML XSLT New in ias WE v2 Available at partner web P7 Content transformation Harmonized signature interface Payment clearing with ACI ACI ACI payment gw gw Servant OCSP Security Center Systems Architecture HTML P7 DP5 DP5 WIG WIG WIG WML P7, ISO9797 Web server Oracle 9iAS Wireless Adapters P7, ISO9797 XML Sign tag /Oracle SDK HTML P7 Servant Servant OCSP OCSP Security Security Center Center Wireless Wireless Certificate Certificate Enrollment Enrollment Server Server Certificate Certificate Manager Manager Oracle OID X500 8

15 Example: B2C using wireless PKI Request signature Sign Transaction use private key on SIM Telecom Operator Notify Merchant and process payment Bank Request order confirmation Place Order, specify mobile payment Solution Highlights A complete platform to implement solutions over the mobile and fixed Internet using the highest security standard available. Any content or application becomes available on any device. Create Once Publish Everywhere Personalized Content Secure Portal Services Harmonized Signature Interface Leverage SMS channel Public Key Infrastructure becomes a part of the development environment. International standards are supported. Digital certificates can be stored on any device: smart card, SIM-card or as a soft certificate. Certificate issuing and management 9

16 More information or Background What is required is the equivalent to: 10

17 The four elements of security Confidentiality Integrity Eavesdropping Modification Authentication Non-repudiation Faked identify Not sent Claims Receipt PKI - Public Key Infrastructure Juliet s Private Key Romeo s Private Key Juliet s Public Key Romeo s Public Key 11

18 Signing the message Meet me at the balcony, Juliet Clear Text Message Juliet s Private Key Sign Signed data Meet me at the balcony, xa7a1 Encrypting it Meet me at the balcony, xa7a1 Signed data Romeo s Public Key Encrypt Encrypted and signed data 8duqhj482aq29#1ej&2aVhd2# 2 Deliver to Romeo... 12

19 Decrypting it 8duqhj482aq29#1ej&2aVhd2# 2 Encrypted and signed data Romeo s Private Key Decrypt Signed data Meet me at the balcony, xa7a1 Checking the signature Meet me at the balcony, xa7a1 Signed data Juliet s Public Key Verify Clear Text Message Meet me at the balcony, Juliet 13

White Paper. (Wireless) Enterprise PC Security. Author: Sten Lannerstrom, SmartTrust. Document number: MPM02:0015 Revision: A

White Paper. (Wireless) Enterprise PC Security. Author: Sten Lannerstrom, SmartTrust. Document number: MPM02:0015 Revision: A Author: Sten Lannerstrom, SmartTrust (Abstract) From a security perspective the traditional handset could become a personal trusted device (PTD) as its internal structure already carries a smart card capable

More information

How To Use Smarttrust Wib On A Sim Card On A Mobile Phone

How To Use Smarttrust Wib On A Sim Card On A Mobile Phone Application Partner Program Technology Introduction A condensed tutorial on applications in SmartTrust s technical context July 2009 version SmartTrust, your partner in VAS SmartTrust Wib is the world

More information

Mobile Commerce. Contents

Mobile Commerce. Contents Mobile Commerce The new commercial environment ivazquez@eside.deusto.es Faculty of Engineering Contents What is m-commerce? Advantages Enabling technologies services Forecasts Conclussions 1 What is m-commerce?

More information

An Introduction to Entrust PKI. Last updated: September 14, 2004

An Introduction to Entrust PKI. Last updated: September 14, 2004 An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In

More information

TeleTrusT European Bridge CA Status and Outlook

TeleTrusT European Bridge CA Status and Outlook TeleTrusT European Bridge CA Status and Outlook TeleTrusT Workshop, Saarbrücken, 2010-06-11 Dr. Guido von der Heidt, Siemens AG Copyright Siemens AG 2010. All rights reserved. Secure (E-Mail) Communication

More information

Public-Key Infrastructure

Public-Key Infrastructure Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

Benutzerfreundlich, tiefe Betriebskosten und hohe Sicherheit. Warum sich diese Ziele nicht widersprechen müssen

Benutzerfreundlich, tiefe Betriebskosten und hohe Sicherheit. Warum sich diese Ziele nicht widersprechen müssen Benutzerfreundlich, tiefe Betriebskosten und hohe Sicherheit. Warum sich diese Ziele nicht widersprechen müssen Jean Paul Kölbl CEO IT-Secure.com AG Total access security Heutige Situation Kostendruck

More information

Citrix Enterprise Mobility more than just device management (MDM)

Citrix Enterprise Mobility more than just device management (MDM) Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

<Insert Picture Here> Oracle Direct Potsdam

<Insert Picture Here> Oracle Direct Potsdam ORACLE BPEL Process Manager Dr. Jens Hündling Senior Systemberater Oracle Direct Potsdam Java User Group Saxony Technische Universität Chemnitz 24. Juni 2010 The following is intended

More information

The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority

The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority Dr. Ali M. Al-Khouri Emirates Identity Authority, Abu Dhabi, United Arab Emirates Abstract Digital

More information

White Paper: Managing Security on Mobile Phones

White Paper: Managing Security on Mobile Phones White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

Oracle Internet Messaging - UM Option

Oracle Internet Messaging - UM Option Oracle Internet Messaging - UM Option Prepared by Oracle Business Development - NEMS Creation Date: Friday, July 17th, 1998 Last Updated: Friday, July 24th, 1998 Copyright (C) 1998 Oracle Corporation All

More information

Advanced Administration

Advanced Administration BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What

More information

Open Text Social Media. Actual Status, Strategy and Roadmap

Open Text Social Media. Actual Status, Strategy and Roadmap Open Text Social Media Actual Status, Strategy and Roadmap Lars Onasch (Product Marketing) Bernfried Howe (Product Management) Martin Schwanke (Global Service) February 23, 2010 Slide 1 Copyright Open

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

Wealth Management System

Wealth Management System Wealth Management System Clients in the new economy demand straight answers. With ubiquitous information on the Internet and an around-the-clock global financial market accessible by pagers, email, mobile

More information

ViSolve Open Source Solutions

ViSolve Open Source Solutions ViSolve Open Source Solutions Best-In-Class Authentication and Authorization Solutions & Services ViSolve Inc. ViSolve Securing Digital Assets Contents Security Overview Security Concerns Security Needs

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and

More information

Deployment-Optionen für den optimierten Desktop. Hans.Schermer@citrix.com Senior Systems Engineer, Citrix Systems

Deployment-Optionen für den optimierten Desktop. Hans.Schermer@citrix.com Senior Systems Engineer, Citrix Systems Deployment-Optionen für den optimierten Desktop Hans.Schermer@citrix.com Senior Systems Engineer, Systems V-Alliance & Microsoft = V-Alliance Zusammenarbeit in allen Bereichen der Server-, Anwendungs -

More information

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution. IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services Combine resources for one complete online business security solution. Big e-business opportunities demand security to match

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

Project Chase Manhattan

Project Chase Manhattan T-NetSix Enon Corporation Project Chase Manhattan How T-NetSix Enon Corporation created new innovative mobile banking solution for Chase Manhattan bank Company background: T-NetSix Enon is a IT services

More information

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform Communiqué 4 Standardized Communiqué 4 - fully implementing the JCR (JSR 170) Content Repository Standard, managing digital business information, applications and processes through the web. Communiqué

More information

CA Computer Associates. Nils Meyer CA Computer Associates GmbH Hamburg

CA Computer Associates. Nils Meyer CA Computer Associates GmbH Hamburg CA Computer Associates Nils Meyer CA Computer Associates GmbH Hamburg Agenda CA Das Unternehmen CA Die Geschichte CA Die Softwarelösungen Diskussion CA Das Unternehmen CA Computer Associates International

More information

Breeder documents closing the gap in the identity management chain. Christian Wagner VP SDM Government Washington, March 23, 2015

Breeder documents closing the gap in the identity management chain. Christian Wagner VP SDM Government Washington, March 23, 2015 Breeder documents closing the gap in the identity management chain Christian Wagner VP SDM Government Washington, March 23, 2015 INTERNET OF THINGS IS RISING Five-Year (2014-2019) CAGR 57% 2014, Business

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Digital Signatures and Interoperability

Digital Signatures and Interoperability Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000

More information

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008 Oracle Security Developer Tools (OSDT) August 2008 Items Introduction OSDT 10g Architecture Business Benefits Oracle Products Currently Using OSDT 10g OSDT 10g APIs Description OSDT

More information

The Costs of Managed PKI:

The Costs of Managed PKI: The Costs of Managed PKI: In-House Implementation of PKI vs. Traditional Managed PKI vs. ON-Demand PKI A TC TrustCenter Whitepaper Last Updated: February 2008 Introduction Until recently, organizations

More information

Public Key Infrastructure for a Higher Education Environment

Public Key Infrastructure for a Higher Education Environment Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware

More information

Web and e-business Technologies

Web and e-business Technologies ActivePotato Corporation www.activepotato.com Web and e-business Technologies By Rohit Chugh rohit.chugh@activepotato.com For the IEEE Ottawa Chapter June 2, 2003 2003 by Rohit Chugh 1 Agenda Web Technologies

More information

Exploring ADSS Server Signing Services

Exploring ADSS Server Signing Services ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)

More information

RSA Digital Certificate Solution

RSA Digital Certificate Solution RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong

More information

Qualified mobile electronic signatures: Possible, but worth a try?

Qualified mobile electronic signatures: Possible, but worth a try? Qualified mobile electronic signatures: Possible, but worth a try? Lothar Fritsch 1, Johannes Ranke 2, Heiko Rossnagel 1 Interest level of audience: 3 - for application developers (interested in IT security)

More information

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should

More information

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory

More information

Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation

Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation Integrating Biometrics into the Database and Application Server Infrastructure Shirley Ann Stern Principal Product Manager Oracle Corporation 1 Agenda! Introduction Importance of the infrastructure Role

More information

Digicomp Microsoft Evolution Day 2015 1. MIM 2016 Oliver Ryf. Partner:

Digicomp Microsoft Evolution Day 2015 1. MIM 2016 Oliver Ryf. Partner: 1 MIM 2016 Oliver Ryf Partner: 2 Agenda Begrüssung Vorstellung Referent PowerShell Desired State Configuration F&A Weiterführende Kurse 3 Vorstellung Referent Seit 1991 IT-Trainer 1995 MCSE und MCT Seit

More information

FAQs for Two-factor Authentication

FAQs for Two-factor Authentication FAQs for Two-factor Authentication Two-factor Authentication 1. What is two-factor authentication? Two-factor authentication is an authentication scheme that increases online security by relying on a combination

More information

Understanding digital certificates

Understanding digital certificates Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH mickobrien137@hotmail.co.uk, george.weir@cis.strath.ac.uk

More information

BlackBerry Enterprise Solution

BlackBerry Enterprise Solution BlackBerry Enterprise Solution The leading wireless solution for connecting mobile users to the customers, colleagues and information that drive business. BlackBerry Enterprise Solution Mobilize Your Email,

More information

BlackBerry Enterprise Solution and RSA SecurID

BlackBerry Enterprise Solution and RSA SecurID Technology Overview BlackBerry Enterprise Solution and RSA SecurID Leveraging Two-Factor Authentication to Provide Secure Access to Corporate Resources Table of Contents Executive Summary 3 Empowering

More information

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network 70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites

More information

A secure, economic infrastructure for signing of web based documents and financial affairs Overview of a server based, customer-friendly approach.

A secure, economic infrastructure for signing of web based documents and financial affairs Overview of a server based, customer-friendly approach. 1 of 8 15.03.2004 14:09 Issue January 2002 A secure, economic infrastructure for signing of web based documents and financial affairs Overview of a server based, customer-friendly approach. Lothar Fritsch,

More information

Secure Mobile POS System

Secure Mobile POS System A point of sale application for secure financial transitions in a mobile business enviroment KAZI MASUM SADIQUE KTH Information and Communication Technology Master of Science Thesis Stockholm, Sweden 2013

More information

What is an SSL Certificate?

What is an SSL Certificate? Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert

More information

RSA Security RSA Keon Certificate Authority PKI Product

RSA Security RSA Keon Certificate Authority PKI Product Kristen Noakes-Fry Product Report 1 August 2003 RSA Security RSA Keon Certificate Authority PKI Product Summary RSA Keon Certificate Authority a PKI platform for Internet and e-commerce applications serves

More information

prefer to maintain their own Certification Authority (CA) system simply because they don t trust an external organization to

prefer to maintain their own Certification Authority (CA) system simply because they don t trust an external organization to If you are looking for more control of your public key infrastructure, try the powerful Dogtag certificate system. BY THORSTEN SCHERF symmetric cryptography provides a powerful and convenient means for

More information

Life is now. www.vodafone.com.mt

Life is now. www.vodafone.com.mt BlackBerry Enterprise Solution Mobilise Your E-mail and Enterprise Applications The leading wireless solution for connecting mobile users to the customers, colleagues and information that drive business.

More information

Government Service Bus

Government Service Bus Government Service Bus The GSB (Government Service Bus) is intended to become the central platform of integration and services for the provision of government electronic services and transactions, and

More information

Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability. Version 1.0.3

Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability. Version 1.0.3 Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability Version 1.0.3 Prepared for: Department of Defense (DoD) PKI August 27, 2008 Page 1 Table of

More information

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part III-a Contents Part III-a Public-Key Infrastructure (PKI) Definition of a PKI and PKI components PKI Trust Models Digital Certificate, X.509 Certificate Management and Life Cycle Public Key Infrastructure

More information

BlackBerry Enterprise Solution

BlackBerry Enterprise Solution BlackBerry Enterprise Server BlackBerry Enterprise Solution The leading wireless solution for connecting mobile users to the customers, colleagues and information that drive business. Mobilize your email,

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

Company presentation SHARES - CENKOS Innovators & Investors FORUM 29 January 2013. globoplc.com

Company presentation SHARES - CENKOS Innovators & Investors FORUM 29 January 2013. globoplc.com Company presentation SHARES - CENKOS Innovators & Investors FORUM 29 January 2013 2 Introduction GLOBO is an international leader and technology innovator in the mobile consumer and enterprise application

More information

Introducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI

Introducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI Introducing AirWatch by VMware: Enterprise Mobility Simplified Menny Tsarfaty EUC Business Specialist MEDI Market already changed End-User Computing Vision PCs, Laptops Thin Clients Tablets, Smartphones

More information

Security MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved.

Security MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved. Security MWC 2014 2013 Nokia Solutions and Networks. All rights reserved. Security Ecosystem overview Partners Network security demo + End-user security demo + + + + NSN end-to-end security solutions for

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

& corporate mobile value added services

& corporate mobile value added services & corporate mobile value added services Case Juha Hä kä mies Juha Matti Hä kä mies Licentiate of Technology (Helsinki University of Technology) Married 2 children (3 years daughter & 5 years son) Clarinet

More information

Oracle9i Application Server: Options for Running Active Server Pages. An Oracle White Paper July 2001

Oracle9i Application Server: Options for Running Active Server Pages. An Oracle White Paper July 2001 Oracle9i Application Server: Options for Running Active Server Pages An Oracle White Paper July 2001 Oracle9i Application Server: Options for Running Active Server Pages PROBLEM SUMMARY...3 INTRODUCTION...3

More information

Installation and Configuration Guide

Installation and Configuration Guide Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

Mobile Banking. Product Overview

Mobile Banking. Product Overview Mobile Banking Product Overview financial services & retail enterprise internet content providers public sector telecommunications > PRODUCT transport Introduction Mobile phones have become an integral

More information

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should

More information

AnyWeb AG 2008 www.anyweb.ch

AnyWeb AG 2008 www.anyweb.ch HP SiteScope (End-to-End Monitoring, System Availability) Christof Madöry AnyWeb AG ITSM Practice Circle September 2008 Agenda Management Technology Agentless monitoring SiteScope in HP BTO SiteScope look

More information

Single Sign-On Access Management A Technical Framework on Access Management Systems

Single Sign-On Access Management A Technical Framework on Access Management Systems Single Sign-On Access Management A Technical Framework on Access Management Systems Polaris Software Lab Ltd., 766, Anna Salai, Chennai, INDIA 600 006 Single Sign-On Access Management Service This paper

More information

Identity & Privacy Protection

Identity & Privacy Protection Identity & Privacy Protection An Essential Component for a Federated Access Ecosystem Dan Turissini - CTO, WidePoint Corporation turissd@orc.com 703 246 8550 CyberSecurity One of the most serious economic

More information

Protect Everything: Networks, Applications and Cloud Services

Protect Everything: Networks, Applications and Cloud Services Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active

More information

AlphaTrust PRONTO Enterprise Platform Product Overview

AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform is server-based software that automates the creation of legally enforceable, permanent business records that

More information

White Paper. Bearer Independent Protocol (BIP)

White Paper. Bearer Independent Protocol (BIP) White Paper Bearer Independent Protocol (BIP) - 2 - Contents 1 Executive summary...4 2 Introduction...5 3 Solution description...5 3.1 Standards compliance...5 3.2 Interface architecture...6 3.3 Data carriers...9

More information

Mobile Web Services Workshop 行 動 式 網 際 網 路 服 務 平 臺. 工 研 院 電 通 所 網 際 網 路 軟 體 技 術 組 鄭 仁 傑 Roger Jen-Chieh Cheng rogercheng@itri.org.

Mobile Web Services Workshop 行 動 式 網 際 網 路 服 務 平 臺. 工 研 院 電 通 所 網 際 網 路 軟 體 技 術 組 鄭 仁 傑 Roger Jen-Chieh Cheng rogercheng@itri.org. Mobile Web Services Workshop 行 動 式 網 際 網 路 服 務 平 臺 工 研 院 電 通 所 網 際 網 路 軟 體 技 術 組 鄭 仁 傑 Roger Jen-Chieh Cheng rogercheng@itri.org.tw 1 Agenda Evolution (What hava happened?) Web Application Mobile Internet

More information

BEA Systems Business Problem: Der x-business Marktplatz Technologische Lösung: Eine E-Business Platform Produkte für die Lösung Software/Information Behörden Staat Urlaub Technische Information t-, m-,

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

How To Run A Server On A Linux Computer (For Free) On A Microsoft Server (For Linux) On An Ipad Or Ipad (For Microsoft) On Free Software (For Ubuntu) On Your Computer Or Ipa (

How To Run A Server On A Linux Computer (For Free) On A Microsoft Server (For Linux) On An Ipad Or Ipad (For Microsoft) On Free Software (For Ubuntu) On Your Computer Or Ipa ( The real Way of Open Source FOSS Group AG, Hauptstrasse 91, CH 4147 Aesch FOSS Group GmbH, Bismarckallee 9, 79098 Freiburg 2008 by FOSS Group Die FOSS Group ist ein Zusammenschluss von hochkarätigen Free

More information

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2. Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions

More information

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013 2013 PKI Made Easy: Managing Certificates with Dogtag Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013 Agenda What is PKI? What is Dogtag? Installing Dogtag Interacting with Dogtag using REST Future

More information

Title Page. Hosted Payment Page Guide ACI Commerce Gateway

Title Page. Hosted Payment Page Guide ACI Commerce Gateway Title Page Hosted Payment Page Guide ACI Commerce Gateway Copyright Information 2008 by All rights reserved. All information contained in this documentation, as well as the software described in it, is

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

- Was gibt es Neues? - Mobile Update

- Was gibt es Neues? - Mobile Update - Was gibt es Neues? - Mobile Update Volker Linz Systemberater, Oracle E-Mail: volker.linz@oracle.com +++ Bitte wählen Sie sich in die Telefonkonferenz entweder mit 0800/6648515 oder aus dem Mobilfunknetz

More information

Public Key Infrastructure. A Brief Overview by Tim Sigmon

Public Key Infrastructure. A Brief Overview by Tim Sigmon Public Key Infrastructure A Brief Overview by Tim Sigmon May, 2000 Fundamental Security Requirements (all addressed by PKI) X Authentication - verify identity of communicating parties X Access Control

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

> Please fill your survey to be eligible for a prize draw. Only contact info is required for prize draw Survey portion is optional

> Please fill your survey to be eligible for a prize draw. Only contact info is required for prize draw Survey portion is optional Web Access Management May 2008 CA Canada Seminar > Please fill your survey to be eligible for a prize draw Only contact info is required for prize draw Survey portion is optional > How to Transform Tactical

More information

Effiziente Kundenbetreuung auch von unterwegs: SAP CRM Sales. Michael Wallenczus, SAP (Schweiz) AG 17. April 2012

Effiziente Kundenbetreuung auch von unterwegs: SAP CRM Sales. Michael Wallenczus, SAP (Schweiz) AG 17. April 2012 Effiziente Kundenbetreuung auch von unterwegs: SAP CRM Sales Michael Wallenczus, SAP (Schweiz) AG 17. April 2012 ROADMAP & SPECIFICATION DISCLAIMER This document outlines our general product direction

More information

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration

More information

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Authentication. Authentication in FortiOS. Single Sign-On (SSO) Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication

More information

Mobile Devices: Server and Management Lesson 02 Application Servers Part 1

Mobile Devices: Server and Management Lesson 02 Application Servers Part 1 Mobile Devices: Server and Management Lesson 02 Application Servers Part 1 Oxford University Press 2007. All rights reserved. 1 Application server Software, which executes at a server and serves the application-level

More information

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

User Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3

User Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3 User Authentication FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook User Authentication v3 16 December 2011 01-433-122870-20111216 Copyright 2011 Fortinet, Inc. All rights reserved. Contents and

More information

Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample

Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Frost & Sullivan http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm EST

More information

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information