TPR0439CX. Application Note. How to secure Femtocells using VaultIC TM Security Modules?

Size: px
Start display at page:

Download "TPR0439CX. Application Note. How to secure Femtocells using VaultIC TM Security Modules?"

Transcription

1 TPR0439CX Application Note How to secure Femtocells using VaultIC TM Security Modules?

2 2

3 Table of Contents Introduction What is a Femtocell? Security risks in a Femtocell system What are the risks? What are the attacks? VaultIC solution Inside the VaultIC Module Against attack number Against attack number Against attack number Conclusion...12 Definitions & Abbreviations...13 Revision History

4 4

5 Introduction Due to the popularity of mobile phones at home and the increased demand for mobile voice and broadband capacity, Femtocells, which respond to these demands, have found a ready market. However Femtocells use the Internet to deliver voice and data services which means that there are elevated risks of security attacks. Mobile Operators need to be prepared for these attacks and must employ defenses against them to prevent identity theft, fraud and confidentiality violations. VaultIC Security Modules - based on highly secure microcontrollers used in Banking or ID markets - can respond to these challenges. Depending on the size of the data which needs to be secured, the VaultIC Security Modules Family is composed of ATVaultIC100, and ATVaultIC4xx Series with various interfaces and file system sizes. 5

6 1. What is a Femtocell? "Originally known as an Access Point Base Station, a Femtocell (or FAP) is a small cellular Base Station (BTS) typically designed for use in a home or small business. It connects to the service provider s network via broadband cable or DSL internet connections; current designs typically support 2 to 4 active mobile phones simltaneously in a residential setting." (Source: Wikipedia). A Femtocell allows Mobile Operators to extend service coverage indoors at the subscriber home or business. It could enhance their Average Revenue Per User (ARPU) and profitability with new tariffs, pricing plans or "Femto Zone" Services. At the same time, mobile consumers benefit mostly from "five bars" of coverage throughout the household, higher data rates per user, better quality voice and the use of their existing handsets, not to mention the interaction with home networks in new and exciting ways. For instance, Femtocells will make it easier for users to download music and videos, or even control home appliances remotely from the phone. The Femtocell incorporates the functionality of a typical base station but extends it to allow a simple, self-contained deployment by offering new levels of service to consumers and new economic deployment models for operators. Figure 1-1. Femtocell Environment 6

7 2. Security risks in a Femtocell system 2.1 What are the risks? The Mobile Operators, as well as subscribers, are concerned with fraud and service theft, privacy and confidentiality violations. Indeed if attack risks are under-estimated, the Mobile Operators can lose revenues and consumers their privacy. Fraud and service theft Since Internet is usually used as the access network between the Mobile Operator s Network core and the FAPs, it is easy to imagine that identity theft could be used to access the network and therefore services, consuming resources and expenditures. An attacker using registration flood attacks for instance may be able to assume the identity of the FAP by spoofing at multiple layers. Service theft can take the form of obtaining more services than authorized or paid for (i.e., piggybacking on existing session signaling messages with additional media sessions), exploiting early media, so sessions are not accounted for and billed and utilizing higher bandwidth codecs than negotiated during the session establishment. Privacy and confidentiality violation Even if digital networks, like GSM and UMTS, encode the voice and data messages sent from the mobile to the base station, the link between the base station to the operators central switching centers is weak, as conversations travel over the internet. So they can be caught by hackers and use for malicious means such as identity theft and password phishing, which can cause lost revenue or lawsuits. Bill avoidance Like bypassing electricity or gas meters, the Femtocell could be used to access services for free. 2.2 What are the attacks? Attacks threats can be listed in two categories: third party attacks, which target the communication links, and hosting party attacks, which target the FAP devices themselves. Third party attacks include man-in-the-middle attacks, traffic spying, eavesdropping, "fake base station" attacks and authentication snooping. The communication links aimed at are between the handset and the FAP, and/or the FAP and the Network (Attack Numbers 2 and 3 in Figure 2-1). For instance, if the hacker succeeds in being authenticated to the network, then he has access to free services. Another example is traffic spying: the hacker can capture sensitive information and make improper use of it. Hosting party attacks include hacking, reverse engineering and device cloning. The devices themselves (FAP in this case) are targeted (Attack Number 1 in Figure 2-1). The figure below shows where the threats are, in a Femtocell architecture (The attacks are numbered on the diagram and will be identified with these numbers in the next paragraph). 7

8 Figure 2-1. Femtocell attacks diagram 1 3 Voice Data Femtocell Broadband Router Internet Mobile Operator Network 2 Femtocell Gateway Controller 8

9 3. VaultIC solution Conscious of all the threats described above, VaultIC products can provide the security needed: a solution to prevent the system from unauthorized access and fraud is to embed a VaultIC security module in a Femtocell. 3.1 Inside the VaultIC Module... A VaultIC Module can be considered as a secure box, storing secrets seamlessly and securely. To do this, the secret objects are stored in the secure memory of the module, in the form of a dynamic file system. In the Femtocells case, the file system downloaded by the manufacturer in an VaultIC might be composed as follows: Administrator data : file system version, private keys. These data allow the Mobile Operator s Network to be authenticated to the Femtocell and then to upgrade keys or change administration data. FAP data : identifier, private keys, certificate. These data allow the Mobile Operator s Network to authenticate the FAP before allowing access to core networks and services. For more security these data are unique per chip. Devices data : identifier of each handset, access rights for each handset. These data allow the FAP to authenticate each device in the home/business network. Figure 3-1. VaultIC Solution Integration Femtocell Baseband processor RF Main processor Femtocell Application IPsec Application VaultIC module Authentication / Secure Channel... Ethernet Administration Services (key Management) Secure Data Storage Cryptographic Services (sign / encrypt...) 9

10 3.2 Against attack number 1... VaultIC Modules embed dedicated hardware for protection against SPA/DPA attacks, advanced protection against physical attack (including active shield), environmental protection systems (voltage, frequency, temperature monitors), light protection and secure management/access protection. Reverse engineering or cloning are then not possible on the VaultIC modules. Moreover, the main processor of the Femtocell and the VaultIC Module can authenticate each other and therefore open a Secure Channel, allowing secure data exchanges which prevents spying on the communication bus. The FAP, and therefore the secret file system, is then secure and hosting party attacks are warded off. 3.3 Against attack number 2... Considering the attack number 2 described in page 8, it appears that the handsets of the home/business network must be authenticated. To do this, a VaultIC Security Module can identify several devices with different privileges : for instance the manufacturer, the host (Network) and the handsets. Moreover, each device can be assigned different access rights. For example updating secret keys may only be done by the Network (host) whereas a handset only has the right to download data from the Internet. In this way the file system allows different security levels. Another aspect of the local network is secure communication: thanks to the VaultIC Module, data between handsets and the FAP are encrypted. Attack Number 2 in the schematic above is then prevented. 3.4 Against attack number 3... In the same way as the previous paragraph, the FAP and the network must mutually authenticate each other. In order to authenticate the FAP on the Mobile Operator s Network, a VaultIC Security Module can securely store sensitive data, such as a unique certificate (obviously delivered by a trusted organism, so that they can not be duplicated) and a key-pair unique per VaultIC. In this way, each FAP is unique and considered as genuine by the Mobile Operator s Network. Each VaultIC module can also generate his own key-pair and use it for the strong authentication process that VaultIC modules can perform with the Operator s Network. As a result FAPs will be authenticated on the Network and allowed to make connection and access authorized services. It can also authenticate the Network and therefore avoid transferring private data to a "fake" network. Moreover, data exchanges between the FAP and the Network are secure: Femtocells use IPsec for transferring data. IPsec is a suite of protocols that has encryption and signature mechanisms to ensure subscriber communication confidentiality. Encrypting the voice and packet data prior to Internet transport hides the actual content. VaultIC Security Modules can provide cryptographic mechanisms: VaultIC Modules can generate the cryptographic primitives needed by the main CPU of the FAPs in order to use the IPsec protocol, as described on Figure These primitives include algorithms such as 3DES, AES, RSA up to 4096 bits, DSA up to 2048 bits, ECC up to 384 bits, as well as Public Key Pair Generation, Digital Signature, Encryption / Decryption, Key Wrapping / Unwrapping and HOTP One-Time Password Generation. For more details, please refer to the technical datasheets ot the VaultIC products.

11 Note that these primitives are computed with very good performances thanks to hardware cryptographic engines. All the solutions described above can be schematically represented as follows: Figure 3-2. VaultIC implementation Voice Data Broadband Router Femtocell authentication authentication Internet IPsec Mobile Operator Network Femtocell Gateway Controller 11

12 4. Conclusion According to a recent study from ABI research, by 2011 there will be 102 million users of Femtocell products on 32 million access points worldwide. But because Femtocells typically use the Internet for voice and data traffic, the Mobile Operators network is opened to risks. In addition to ensuring an adequate mobile residential coverage and responding to emerging VoIP and WiFi offerings, Mobile Operators want to preserve their ARPU and protect their subscribers privacy. Subscribers want assurance that their home networks are secure and their private life is protected. Implementing VaultIC Security Modules in Femtocells provide user authentication, registration and authentication and therefore prevent fraud and confidentiality violation. VaultIC Security Modules protect the fundamental mechanisms: Mutual authentication : FAPs and the Network are mutually authenticated to authorize data exchanges. Data Privacy : Due to the hostile and unreliable features of the network, the privacy and the confidentiality of the data exchanged between the FAP, the network and the handsets are protected. Data Integrity : The FAP is not physically vulnerable to tampering by malicious users. For more details about the VaultIC Products Family please contact your local INSIDE Secure Sales office. 12

13 Definitions & Abbreviations AES Advanced Encryption Standard algorithm as defined in FIPS PUB 197 ARPU ASSP Authentication DES/3DES Average Revenue Per Unit Application Specific Standard Product An identification or entity authentication technique assures one party (the verifier), through acquisition of corroborative evidence, of both the identity of a second party involved, and that the second (the claimant) was active at the time the evidence was created or acquired. (From Handbook of Applied Cryptography) Data Encryption Standard algorithm as defined in FIPS PUB Tiple DES algorithm DSA Digital Signature Algorithm as defined in FIPS PUB ECC FAP Femto Zone Services FGW GSM IPsec RSA SPA/DPA UMTS Elliptic Curves algorithm Femtocell Access Point. This is the Femtocell term in a network environement Mobile data / voice services triggered when the phone comes in range of the Femtocell. For instance, get an SMS when your kids arrive or depart the home, automatic podcast reload and photo / video upload to the web when you get at home Femtocell Gateway Controller Global System for Mobile Communications, the most popular standard for mobile phones Internet Protocol Security. It is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session Rivest Shamir Adleman algorithm Simple Power-Analysis involves visually interpreting power traces, or graphs of electrical activity over time. Differential Power-Analysis is more advanced form of power analysis which can allow an attacker to compute the intermediate values within cryptographic computations by statistically analyzing data collected from multiple cryptographic operations Universal Mobile Telecommunications System, one of the third-generation (3G) mobile telecommunications technologies 13

14 14

15 Revision History Document Details Title: How to secure Femtocells using VaultIC TM Security Modules? Literature Number: TPR0439CX Date: 01Mar11 Rev. TPR0439AX-SMS-09/09 Official release - Final draft Rev. TPR0439BX-SMS-12/09 Minor corrections (english) Rev. TPR0439CX-VIC-03/11 Inside Secure Format migration 15

16 Headquarters Product Contact INSIDE Secure 41, Parc Club du Golf Aix-en-Provence Cedex 3 France Tel: +33 (0) Fax: +33 (0) Web Site Technical Support [email protected] Sales Contact [email protected] Disclaimer: All products are sold subject to INSIDE Secure Terms & Conditions of Sale and the provisions of any agreements made between INSIDE Secure and the Customer. In ordering a product covered by this document the Customer agrees to be bound by those Terms & Conditions and agreements and nothing contained in this document constitutes or forms part of a contract (with the exception of the contents of this Notice). A copy of INSIDE Secure Terms & Conditions of Sale is available on request. Export of any INSIDE Secure product outside of the EU may require an export Licence. The information in this document is provided in connection with INSIDE Secure products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of INSIDE Secure products. EXCEPT AS SET FORTH IN INSIDE SECURE S TERMS AND CONDITIONS OF SALE, INSIDE SECURE OR ITS SUPPLIERS OR LICENSORS ASSUME NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL INSIDE SECURE BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, EXEMPLARY, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, LOSS OF REVENUE, BUSINESS INTERRUPTION, LOSS OF GOODWILL, OR LOSS OF INFORMATION OR DATA) NOTWITHSTANDING THE THEORY OF LIABILITY UNDER WHICH SAID DAMAGES ARE SOUGHT, INCLUDING BUT NOT LIM- ITED TO CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCTS LIABILITY, STRICT LIABILITY, STATUTORY LIABILITY OR OTHERWISE, EVEN IF INSIDE SECURE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. INSIDE Secure makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. INSIDE Secure does not make any commitment to update the information contained herein. INSIDE Secure advises its customers to obtain the latest version of device data sheets to verify, before placing orders, that the information being relied upon by the customer is current. INSIDE Secure products are not intended, authorized, or warranted for use as critical components in life support devices, systems or applications, unless a specific written agreement pertaining to such intended use is executed between the manufacturer and INSIDE Secure. Life support devices, systems or applications are devices, systems or applications that (a) are intended for surgical implant to the body or (b) support or sustain life, and which defect or failure to perform can be reasonably expected to result in an injury to the user. A critical component is any component of a life support device, system or application which failure to perform can be reasonably expected to cause the failure of the life support device, system or application, or to affect its safety or effectiveness. The security of any system in which the product is used will depend on the system s security as a whole. Where security or cryptography features are mentioned in this document this refers to features which are intended to increase the security of the product under normal use and in normal circumstances. INSIDE Secure All Rights Reserved. INSIDE Secure, INSIDE Secure logo and combinations thereof, and others are registered trademarks or tradenames of INSIDE Secure or its subsidiaries. Other terms and product names may be trademarks of others.

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING

More information

AVR1318: Using the XMEGA built-in AES accelerator. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

AVR1318: Using the XMEGA built-in AES accelerator. 8-bit Microcontrollers. Application Note. Features. 1 Introduction AVR1318: Using the XMEGA built-in AES accelerator Features Full compliance with AES (FIPS Publication 197, 2002) - Both encryption and decryption procedures 128-bit Key and State memory XOR load option

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

M-Shield mobile security technology

M-Shield mobile security technology Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a

More information

ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT

ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT This End User License Agreement ( License ) is an agreement between you and Electronic Arts Inc., its subsidiaries and affiliates ( EA ). This License

More information

SOFTWARE LICENSE AGREEMENT

SOFTWARE LICENSE AGREEMENT SOFTWARE LICENSE AGREEMENT This Software License Agreement (this Agreement ) is entered into as of the installation date of the software by and between Nanotron Technologies GmbH, a German corporation

More information

Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview

Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview Application Note Atmel CryptoAuthentication Product Uses Atmel Abstract Companies are continuously searching for ways to protect property using various security implementations; however, the cost of security

More information

User Agreement. Quality. Value. Efficiency.

User Agreement. Quality. Value. Efficiency. User Agreement Quality. Value. Efficiency. Welcome to QVuE, the Leaders Network on Quality, Value and Efficiency website sponsored by The Medicines Company. The information provided in this Webinar Series

More information

The software on this device includes software licensed by Company from Microsoft Corporation or its affiliates.

The software on this device includes software licensed by Company from Microsoft Corporation or its affiliates. WINDOWS PHONE 7 SOFTWARE LICENSE TERMS These license terms are an agreement between you and Nokia ( Company ), the party distributing the software and device. These terms apply to the software that came

More information

TRIAL AGREEMENT FOR QUALIANCE

TRIAL AGREEMENT FOR QUALIANCE TRIAL AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS TRIAL AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR TRIAL REGISTRATION REQUEST THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE

More information

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128 SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication

More information

AN11241. AES encryption and decryption software on LPC microcontrollers. Document information

AN11241. AES encryption and decryption software on LPC microcontrollers. Document information AES encryption and decryption software on LPC microcontrollers Rev. 1 25 July 2012 Application note Document information Info Content Keywords AES, encryption, decryption, FIPS-197, Cortex-M0, Cortex-M3

More information

AXIS12 DRUPAL IN A BOX ON THE CLOUD

AXIS12 DRUPAL IN A BOX ON THE CLOUD SERVICE LEVEL AGREEMENT AXIS12 DRUPAL IN A BOX ON THE CLOUD version 1.0 Page 1 of 6 This Axis12 Drupal in a box on the cloud Service Level Agreement ( SLA ) is a policy governing the use of the Axis12

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to

More information

Partners in Care Welch Allyn Connex Software Development Kit License Agreement

Partners in Care Welch Allyn Connex Software Development Kit License Agreement This Software Development Kit End User ( Agreement ) is between Welch Allyn, Inc. ( Welch Allyn ) and the Customer identified in the purchase order ( Customer or You ), and it governs the Software Development

More information

APPLICATION NOTE. Secure Personalization with Transport Key Authentication. ATSHA204A, ATECC108A, and ATECC508A. Introduction.

APPLICATION NOTE. Secure Personalization with Transport Key Authentication. ATSHA204A, ATECC108A, and ATECC508A. Introduction. APPLICATION NOTE Secure Personalization with Transport Key Authentication ATSHA204A, ATECC108A, and ATECC508A Introduction The Atmel CryptoAuthentication ATSHA204A, ATECC108A, and ATECC508A devices (crypto

More information

WEBSITE TERMS & CONDITIONS. Last updated March 27, 2015

WEBSITE TERMS & CONDITIONS. Last updated March 27, 2015 WEBSITE TERMS & CONDITIONS Last updated March 27, 2015 1. Introduction and Acceptance of Terms & Conditions Running Away Enterprises, LLC, a Delaware limited liability company d/b/a Enmotive ( us, we,

More information

Terms & Conditions. Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com).

Terms & Conditions. Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com). Terms & Conditions Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com). Your use of this website and Content as defined below constitutes your acceptance

More information

Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement

Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement IMPORTANT: DO NOT INSTALL THE ENCLOSED OR DOWNLOADED SOFTWARE UNTIL YOU HAVE READ THIS PERVASIVE PSQL LICENSE AGREEMENT ( AGREEMENT

More information

NRBN VOICE SERVICES RETAIL AGREEMENT. (9-1-1 VoIP Emergency Calling) NIAGARA REGIONAL BROADBAND NETWORK LIMITED ( NRBN ) - and -

NRBN VOICE SERVICES RETAIL AGREEMENT. (9-1-1 VoIP Emergency Calling) NIAGARA REGIONAL BROADBAND NETWORK LIMITED ( NRBN ) - and - NRBN VOICE SERVICES RETAIL AGREEMENT (9-1-1 VoIP Emergency Calling) Agreement Number: THIS AGREEMENT is made between: NIAGARA REGIONAL BROADBAND NETWORK LIMITED ( NRBN ) - and - The party identified as

More information

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With

More information

CS549: Cryptography and Network Security

CS549: Cryptography and Network Security CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

Website Hosting Agreement

Website Hosting Agreement Website Hosting Agreement 6 oak grove avenue This Hosting Contract governs your purchase and use, in any manner, of all Web site hosting services, including the Shared Hosting Services, (collectively,

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

RSA Two Factor Authentication

RSA Two Factor Authentication RSA Two Factor Authentication VERSION: 1.0 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 16 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc..

More information

Administration Guide. Wireless software upgrades

Administration Guide. Wireless software upgrades Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources

More information

ASYMMETRIC DIGITAL SUBSCRIBER LINE INTERNET ACCESS TERMS

ASYMMETRIC DIGITAL SUBSCRIBER LINE INTERNET ACCESS TERMS ASYMMETRIC DIGITAL SUBSCRIBER LINE INTERNET ACCESS TERMS The following Terms and Conditions govern the rights and obligations of Cable and Wireless and the Customer in connection with Cable and Wireless

More information

Security Requirements for Wireless Networking

Security Requirements for Wireless Networking Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END

More information

Security and the Mitel Teleworker Solution

Security and the Mitel Teleworker Solution Security and the Mitel Teleworker Solution White Paper July 2007 Copyright Copyright 2007 Mitel Networks Corporation. This document is unpublished and the following notice is affixed to protect Mitel Networks

More information

SUBSCRIPTION SERVICES.

SUBSCRIPTION SERVICES. SUSE Manager Server SUSE Manager Server with Database SUSE Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY PURCHASING, INSTALLING AND/OR USING THE SOFTWARE (INCLUDING ITS COMPONENTS),

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

END USER LICENSE AGREEMENT

END USER LICENSE AGREEMENT END USER LICENSE AGREEMENT 1. SCOPE OF THIS AGREEMENT. This END USER LICENSE AGREEMENT ("EULA") is a legal agreement between you (either an individual or a single entity) and TradeStation ("TS") governing

More information

Temperature & Humidity SMS Alert Controller

Temperature & Humidity SMS Alert Controller Temperature & Humidity SMS Alert Controller Version 7 [Windows XP/Vista/7] GSMS THR / GSMS THP Revision 110507 [Version 2.2.14A] ~ 1 ~ SMS Alarm Messenger Version 7 [Windows XP/Vista/7] SMS Pro series

More information

Organized, Hybridized Network Monitoring

Organized, Hybridized Network Monitoring Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

ecatholic Payments Terms of Service Agreement

ecatholic Payments Terms of Service Agreement ecatholic Payments Terms of Service Agreement By signing up for or using the ecatholic Payments service, you agree to be bound by the terms and conditions of this agreement, which may be modified from

More information

SCADA SYSTEMS AND SECURITY WHITEPAPER

SCADA SYSTEMS AND SECURITY WHITEPAPER SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of

More information

Terms of Service MANAGED FIREWALL Service

Terms of Service MANAGED FIREWALL Service This Service is subject to and governed by Customer s separate signed master services agreement with CTS. This Agreement is entered into between you and CTS for the provision of CTS Managed Firewall Services.

More information

The software is sold on an AS IS basis. ALVARION, its affiliates or its licensors MAKE NO

The software is sold on an AS IS basis. ALVARION, its affiliates or its licensors MAKE NO NG_VG Integrated Wireless Home Gateway TECHNICAL SPECIFICATION * Temporary product name Legal Rights The material contained herein is proprietary, and owned by ALVARION Co., Ltd or its third party licensors.

More information

TTL to RS232 Adapter User Guide

TTL to RS232 Adapter User Guide TTL to RS232 Adapter User Guide Revision D March 28, 2011 Document Part Number GC-800-313d Copyright and Trademark Copyright 2006-2011, Grid Connect, Inc. All rights reserved. No part of this manual may

More information

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple. ENGLISH APPLE INC. SOFTWARE LICENSE AGREEMENT FOR APPLE STORE APPLICATION PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE USING THE APPLE SOFTWARE. BY USING THE APPLE SOFTWARE,

More information

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Document Version:2.0-12/07/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be

More information

Application Note. Atmel ATSHA204 Authentication Modes. Prerequisites. Overview. Introduction

Application Note. Atmel ATSHA204 Authentication Modes. Prerequisites. Overview. Introduction Application Note Atmel Authentication Modes Prerequisites Hardware Atmel AT88CK454BLACK Evaluation Board Atmel AT88CK109STK8 Kit Software Atmel Crypto Evaluation Studio (ACES) Overview Understand which

More information

PLEASE READ THESE TERMS AND CONDITIONS OF USE CAREFULLY. THESE TERMS AND CONDITIONS MAY HAVE CHANGED SINCE USER S LAST VISIT TO THIS SITE.

PLEASE READ THESE TERMS AND CONDITIONS OF USE CAREFULLY. THESE TERMS AND CONDITIONS MAY HAVE CHANGED SINCE USER S LAST VISIT TO THIS SITE. Visit Lake Norman Lake Norman Convention & Visitors Bureau 19900 West Catawba Avenue, Suite 102 Cornelius, North Carolina 28031 704-987-3300 visitlakenorman.org TERMS AND CONDITIONS Visit Lake Norman (Lake

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT

EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT This Application End User License Agreement ( License ) is an agreement between you and ViaSat, Inc., with its principal place of business at

More information

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork,

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, TERMS AND CONDITIONS INFLUENCERS AT WORK These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, Ltd. ( InfluencerAtWork ) and you, or if you represent a company or other

More information

MODFLEX MINI GATEWAY ETHERNET USER S GUIDE

MODFLEX MINI GATEWAY ETHERNET USER S GUIDE MODFLEX MINI GATEWAY ETHERNET Last updated March 15 th, 2012 330-0076-R1.0 Copyright 2011-2012 LS Research, LLC Page 1 of 19 Table of Contents 1 Introduction... 3 1.1 Purpose & Scope... 3 1.2 Applicable

More information

Gold Lock Desktop White Paper

Gold Lock Desktop White Paper Gold Lock Desktop White Paper TM EMAIL AND FILE ENCRYPTION SOFTWARE Effective Data Security in the 21st Century Evaluating the needs of appropriate data security and identifying the risks in the modern

More information

BroadSAFE Enhanced IP Phone Networks

BroadSAFE Enhanced IP Phone Networks White Paper BroadSAFE Enhanced IP Phone Networks Secure VoIP Using the Broadcom BCM11xx IP Phone Technology September 2005 Executive Summary Voice over Internet Protocol (VoIP) enables telephone calls

More information

AT88CK490 Evaluation Kit

AT88CK490 Evaluation Kit AT88CK490 Evaluation Kit CryptoAuthentication USB Dongle HARDWARE USER GUIDE Atmel AT88CK490 CryptoAuthentication Evaluation Kit Introduction The Atmel AT88CK490 CryptoAuthentication Evaluation Kit is

More information

App Terms and Conditions!

App Terms and Conditions! 1. INTRODUCTION App Terms and Conditions Thank you for purchasing the App or Apps herein now referred to collectively or individually as (the App ). The App is published by or on behalf of Complexus (Pty)

More information

MOTOROLA MOBILITY INC. LIMITED GLOBAL WARRANTY MOTOROLA TABLET COMPUTER

MOTOROLA MOBILITY INC. LIMITED GLOBAL WARRANTY MOTOROLA TABLET COMPUTER MOTOROLA MOBILITY INC. LIMITED GLOBAL WARRANTY MOTOROLA TABLET COMPUTER FOR CONSUMERS WHO ARE COVERED BY CONSUMER PROTECTION LAWS OR REGULATIONS IN THEIR COUNTRY OF PURCHASE OR, IF DIFFERENT, THEIR COUNTRY

More information

User Manual. Page 2 of 38

User Manual. Page 2 of 38 DSL1215FUN(L) Page 2 of 38 Contents About the Device...4 Minimum System Requirements...5 Package Contents...5 Device Overview...6 Front Panel...6 Side Panel...6 Back Panel...7 Hardware Setup Diagram...8

More information

More Secure, Less Costly IoT Edge Node Security Provisioning

More Secure, Less Costly IoT Edge Node Security Provisioning More Secure, Less Costly IoT Edge Node Security Provisioning Authors: Nicolas Schieli, Sr. Director, Secure Products Group Ron Ih, Sr. Manager, Marketing and Business Development Eustace Asanghanwa, Manager,

More information

White paper. Mobile broadband with HSPA and LTE capacity and cost aspects

White paper. Mobile broadband with HSPA and LTE capacity and cost aspects White paper Mobile broadband with HSPA and LTE capacity and cost aspects Contents 3 Radio capacity of mobile broadband 7 The cost of mobile broadband capacity 10 Summary 11 Abbreviations The latest generation

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

ENROLLMENT AGREEMENT FOR QUALIANCE

ENROLLMENT AGREEMENT FOR QUALIANCE ENROLLMENT AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS ENROLLMENT AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR SUBSCRIPTION ORDER THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE

More information

Terms and Conditions- OnAER Remote Monitoring Service

Terms and Conditions- OnAER Remote Monitoring Service Terms and Conditions- OnAER Remote Monitoring Service TERMS OF SERVICE Please read these terms of user ( Agreement or Terms of Service ) carefully before using the services offered by AERCO International,

More information

Terms of Service. Your Information and Privacy

Terms of Service. Your Information and Privacy These terms of service (the "Terms") govern your access to and use of the Online File Storage ("OFS") websites and services (the "Service"). The Terms are between DigitalMailer, Incorporated and Digital

More information

E-Sign Disclosure & E-Statements Terms and Conditions

E-Sign Disclosure & E-Statements Terms and Conditions (888) 734-4567 [email protected] www.allianceassociationbank.com E-Sign Disclosure & E-Statements Terms and Conditions E-Sign Disclosure Alliance Association Bank is a division of Western

More information

New Security Features

New Security Features New Security Features BlackBerry 10 OS Version 10.3.1 Published: 2014-12-17 SWD-20141211141004210 Contents About this guide... 4 Advanced data at rest protection... 5 System requirements... 6 Managing

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

Secure Shell (SSH) Protocol

Secure Shell (SSH) Protocol Vanguard Applications Ware IP and LAN Feature Protocols Secure Shell (SSH) Protocol Notice 2008 Vanguard Networks 25 Forbes Blvd. Foxboro, MA 02035 (508) 964-6200 All rights reserved Printed in U.S.A.

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

Atmel AVR4921: ASF - USB Device Stack Differences between ASF V1 and V2. 8-bit Atmel Microcontrollers. Application Note. Features.

Atmel AVR4921: ASF - USB Device Stack Differences between ASF V1 and V2. 8-bit Atmel Microcontrollers. Application Note. Features. Atmel AVR4921: ASF - USB Device Stack Differences between ASF V1 and V2 Features Advantages Implementation differences Integration Migration from stack V1 to stack V2 8-bit Atmel Microcontrollers Application

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

Using the RS232 serial evaluation boards on a USB port

Using the RS232 serial evaluation boards on a USB port Document information Info Content Keywords Serial evaluation Board, PN512,PN532, MFRC663, MFRC522, MFRC523, MFRC52x, MFRD522, MFRD523, MFRD52x MIFARE Contactless Smart Card Reader Reference Design, MIFARE

More information

Security Guide. BES12 Cloud

Security Guide. BES12 Cloud Security Guide BES12 Cloud Published: 2015-08-20 SWD-20150812133927242 Contents Security features of BES12 Cloud...4 How BES12 Cloud protects data stored in BlackBerry data centers...4 How BES12 Cloud

More information

InnoCaption TM Service Terms of Use

InnoCaption TM Service Terms of Use PRIOR TO USING THE INNOCAPTION SERVICE YOU MUST REVIEW AND AGREE TO THE TERMS AND CONDITIONS OF THIS SERVICE AGREEMENT ( AGREEMENT ) BY COMPLETING YOUR REGISTRATION ( SIGN UP ) FOR INNOCAPTION SERVICE.

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010 S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...

More information

RSA Two Factor Authentication. Feature Description

RSA Two Factor Authentication. Feature Description RSA Two Factor Authentication Feature Description VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

43% Figure 1: Targeted Attack Campaign Diagram

43% Figure 1: Targeted Attack Campaign Diagram TrendLabs Data exfiltration is the final stage of a targeted attack campaign where threat actors steal valuable corporate information while remaining undetected. 1 43% of most serious threats to the company

More information

BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS

BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS IMPORTANT: READ THIS CAREFULLY BEFORE INSTALLING, USING OR ELECTRONICALLY

More information

BlackBerry Mobile Voice System - BlackBerry MVS Client

BlackBerry Mobile Voice System - BlackBerry MVS Client BlackBerry Mobile Voice System - BlackBerry MVS Client BlackBerry Device Software 5.0 User Guide Version: 5.2 SWD-1249531-0316085151-001 Contents Basics... 2 About the BlackBerry MVS Client... 2... 3 basics...

More information

CA DLP. Release Notes for Advanced Encryption. r12.0

CA DLP. Release Notes for Advanced Encryption. r12.0 CA DLP Release Notes for Advanced Encryption r12.0 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes

More information

Evoqua Water Technologies LLC. ( Evoqua )

Evoqua Water Technologies LLC. ( Evoqua ) Evoqua Water Technologies LLC. ( Evoqua ) Remote Monitoring Services Terms and Conditions of Use These terms and conditions govern the use of Evoqua Link2Site sm Remote Monitoring Services whether the

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

AVR1900: Getting started with ATxmega128A1 on STK600. 8-bit Microcontrollers. Application Note. 1 Introduction

AVR1900: Getting started with ATxmega128A1 on STK600. 8-bit Microcontrollers. Application Note. 1 Introduction AVR1900: Getting started with ATxmega128A1 on STK600 1 Introduction This document contains information about how to get started with the ATxmega128A1 on STK 600. The first three sections contain information

More information

SOFTWARE SUBSCRIPTION SERVICE (SaaS) AGREEMENT

SOFTWARE SUBSCRIPTION SERVICE (SaaS) AGREEMENT SOFTWARE SUBSCRIPTION SERVICE (SaaS) AGREEMENT This Software Subscription Service (SaaS) Agreement (the Agreement ) sets forth the obligations and conditions between you ( Client ) and mysalesman, LLC,

More information

BlackBerry Enterprise Server Wireless Software Upgrades Version: 4.1 Service Pack: 7. Administration Guide

BlackBerry Enterprise Server Wireless Software Upgrades Version: 4.1 Service Pack: 7. Administration Guide BlackBerry Enterprise Server Wireless Software Upgrades Version: 4.1 Service Pack: 7 Administration Guide Published: 2009-10-30 SWDT207654-207654-1030044737-001 Contents 1 Upgrading the BlackBerry Device

More information

BlackBerry World Storefront. Version: 4.3. User Guide

BlackBerry World Storefront. Version: 4.3. User Guide BlackBerry World Storefront Version: 4.3 User Guide Published: 2013-02-21 SWD-20130221142618627 Contents About BlackBerry World... 5 New features and enhancements... 6 Browsing and searching... 7 Search

More information

1.1 Authorized User means an employee of Customer who has been issued a User ID in accordance with Section 3.2(a).

1.1 Authorized User means an employee of Customer who has been issued a User ID in accordance with Section 3.2(a). RealPrence Cloud Video Meeting Services POLYCOM, INC., VIDEO-AS-A-SERVICE TERMS OF SERVICE This Video-as-a-Service Terms of Service (the Agreement ) govern the access to and use of the VaaS by each person

More information

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how

More information

Your Content refers to the information that you wish to transfer using our Services.

Your Content refers to the information that you wish to transfer using our Services. Philips Secure Data Transfer Terms of Service th Revised: May 10, 2012 Thank you for using Philips Secure Data Transfer. These terms of service (the Terms ) govern your access to and use of Philips Secure

More information

Service Description: Dell Backup and Recovery Cloud Storage

Service Description: Dell Backup and Recovery Cloud Storage Service Description: Dell Backup and Recovery Cloud Storage Service Providers: Dell Marketing L.P. ( Dell ), One Dell Way, Round Rock, Texas 78682, and it s worldwide subsidiaries, and authorized third

More information

JUDICIARY ACCOUNT CHARGE SYSTEM PARTICIPATION AGREEMENT

JUDICIARY ACCOUNT CHARGE SYSTEM PARTICIPATION AGREEMENT JUDICIARY ACCOUNT CHARGE SYSTEM PARTICIPATION AGREEMENT PROGRAM DESCRIPTION The Judiciary Account Charge System ( JACS ) enables a participant (herein defined as an individual or business entity, by and

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information