Java Card TM Open Platform for Smart Cards
|
|
|
- Henry Shaw
- 9 years ago
- Views:
Transcription
1 Java Card TM Open Platform for Smart Cards Wolfgang Effing Giesecke & Devrient GmbH C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 1
2 What happened in the past? Every company created its own proprietary standard E.g. a GSM smart card was not able to run a banking application In the PC world it's the same with WinNT, Linux or Macintosh Platform Specific Applications Operating System Microprocessor Chip Card Platform But the internet era taught us The customer wants to use the same applications independent of any platforms C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 2
3 What are the ideas for the future? Creating an operating system, which allows the "Write once - Run anywhere" principle The internet with its JAVA programming language showed us the right way Java Applications (Applets) Java Interpreter Operating System Java Virtual Machine Microprocessor A powerful smart card, which is able to run a GSM, banking or ID application The user selects his requested application and starts C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 3
4 Java Card Basics (1) What is Java Card? A programmable smart card A multi-application smart card An interoperable smart card A smart card for secure application loading A programmable smart card Easy to program using the power of JAVA Object-Oriented Standard Language A lot of programmers Very compact code C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 4
5 Java Card Basics (2) A multi-application smart card Several applications can be loaded onto the same card Firewall between applications Sharing between applications ISO-7816/4 compliant application selection An interoperable smart card Interoperable at the source code level Applications written for one card can run on any card Write once - Run anywhere Interoperable at the load file level Since Java Card Runtime Environment JCRE 2.1 Converted Applet CAP file can be loaded onto any card Interoperable at the loader level Since Open Platform 2.0 The loading APDUs and sequences are defined C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 5
6 Java Card Basics (3) A smart card for secure application loading High security features of Java Card Allows application loading after issuance VM concept No direct hardware access References instead of pointers Bytecode verification Firewall Secured execution contexts C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 6
7 The Java Card Architecture - Overview C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 7
8 The Java Card Architecture - Hardware Chip features (Infineon SLE66CX320P) 64 kbyte ROM 32 kbyte E²PROM 28 kbyte available for the customer 2 kbyte RAM 255 Byte COD/COR per package Crypto-Coprocessor UART DES/3DES in Hardware Advanced Crypto Engine (ACE) for RSA calculations Support of transport protocols C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 8
9 The Java Card Architecture - Native Functions Native Functions Access to the chip hardware Communication protocols (T=0/T=1) Memory Access (E²PROM writing) Special Card Functions Atomic Transaction Facility Transient Storage Crytographic services Symmetric Cryptography (DES, 3DES) Public Key Cryptography (RSA 1024 Bit key, DSA) Hashing (SHA-1) Padding (ISO 9797, PKCS#1, PKCS#5) Signing Encipher, Decipher Firewall control C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 9
10 The Java Card Architecture - JCVM (1) The Java Card Virtual Machine (JCVM) is responsible for Byte Code Interpretation Exception Handling Firewall Checks Object Consistency Checks The JCVM does not support Long, double and float variables Multithreading Garbage collection Reloadable classes Currently no 32 bit integer C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 10
11 The Java Card Architecture - JCVM (2) The JCVM is split into two parts.class files Converter.cap file Interpreter off-card on-card The Converter (off-card VM) Class loading, resolution and linking Verification Bytecode optimization and conversion to CAP file The Interpreter (on-card VM) Bytecode execution Java Card firewall enforcement C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 11
12 The Java Card Architecture - JCRE Java Card Runtime Environment (JCRE) Card Reset Handling Applet Selection and APDU Dispatching Firewall Control and Context Switching Access to Application Identifiers (AIDs) Access to Shareable Interface Objects (SIOs) C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 12
13 The Java Card Architecture - API (1) Java Card API 2.1 java.lang Language Elements javacard.framework Core Applet Functionallity javacard.security Random, Keys, Message Digests, Signatures javacardx.crypto Cipher Services C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 13
14 The Java Card Architecture - API (2) java.lang Object Throwable Exceptions javacard.framework Applet (base class for all Applets) AID APDU (high level IO) System (Transactions, Transient Data, JCRE requests) PIN Util (arraycopy(nonatomic), secure arraycompare) Exceptions, Shareable Interface, ISO7816 Interface C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 14
15 The Java Card Architecture - API (3) javacard.security Key Interfaces Key Builder Message Digest Signature Random Data javacardx.crypto Symmetric Cryptography DES, 3DES Public Key Cryptography RSA, DSA C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 15
16 The Java Card Architecture - Card Management Card Manager Applet, API and Loader Card Content Management Card Life Cycle Management Keyset Management Secure Messaging Applet Signature Verification Applet Installation and Registration Applet Life Cycle Management C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 16
17 Programming a Java Card - Overview Java TM Source Java Compiler Code (Symantec Visual C@fe, Borland J-Builder, Microsoft J++,...) Java Class File G&D Professional (Off-Card VM Converter-Module) Card Application Package (CAP) Java Card (On-Card VM) Functional Test Test with card characteristics The Java source code will be converted into the class files with standard tools Input of the G&D Java Card VM are class files, containing byte code Some work of the JVM is done outside the card A new simplified and smaller card class file (CAP-Format) is generated The CAP-file with the applet is loaded onto the card The applet will be interpreted on the smart card C:\Presentations - JavaCard_OpenPlatform.ppt - ef page 17
JavaCard. Java Card - old vs new
JavaCard 1 Old Smart Cards: One program (applet) Written in machine-code, specific to chip Burned into ROM Java Card - old vs new old vs new smartcards New Smart Cards: Applet written in high-level language
Smart Card Technology Capabilities
Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards
Java Card. Smartcards. Demos. . p.1/30
. p.1/30 Java Card Smartcards Java Card Demos Smart Cards. p.2/30 . p.3/30 Smartcards Credit-card size piece of plastic with embedded chip, for storing & processing data Standard applications bank cards
Smart Card Application Development Using the Java Card Technology
Smart Card Application Development Using the Java Card Technology Milan Fort RWTH Aachen Abstract Through their combination of portability and security, smart cards are playing an increasingly important
Smart Cards a(s) Safety Critical Systems
Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas [email protected] Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business
JCAT. Java Card TM. An environment for attack and test on. Serge Chaumette, Iban Hatchondo, Damien Sauveron CCCT 03 & ISAS 03
CCCT 03 & ISAS 03 JCAT An environment for attack and test on Java Card TM Serge Chaumette, Iban Hatchondo, http:/www.labri.fr/~sauveron/ 2 nd august 2003 Plan 1) The Java Card Security project Context
jcardsim Java Card is simple!
JavaOne Moscow, 2013 jcardsim Java Card is simple! Mikhail Dudarev, CTO of jcardsim.org Brief history of Java Card Basics standards How is that works? Developer Tools Writing our first real life Java Card
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment Carolin Latze University of Berne Table of contents > Introduction Smartcards > Deployment Overview Linux Windows
Mobile Application Languages XML, Java, J2ME and JavaCard Lesson 04 Java
Mobile Application Languages XML, Java, J2ME and JavaCard Lesson 04 Java Oxford University Press 2007. All rights reserved. 1 C and C++ C and C++ with in-line-assembly, Visual Basic, and Visual C++ the
picojava TM : A Hardware Implementation of the Java Virtual Machine
picojava TM : A Hardware Implementation of the Java Virtual Machine Marc Tremblay and Michael O Connor Sun Microelectronics Slide 1 The Java picojava Synergy Java s origins lie in improving the consumer
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
Smart Cards and their Operating Systems
Smart Cards and their Operating Systems Heng Guo HUT, Telecommunications Software and Multimedia Laboratory [email protected] ABSTRACT This paper presents smart cards and their operating systems. First smart
Fachbereich Informatik und Elektrotechnik SunSPOT. Ubiquitous Computing. Ubiquitous Computing, Helmut Dispert
Ubiquitous Computing Ubiquitous Computing The Sensor Network System Sun SPOT: The Sun Small Programmable Object Technology Technology-Based Wireless Sensor Networks a Java Platform for Developing Applications
Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel
Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel [email protected] 1,2 Information Technology Department, 1,2 Gujarat Technological University, Gujarat, India. Abstract: Sun Microsystems
Smart Card APDU Analysis
Smart Card APDU Analysis Black Hat Briefings 2008 Las Vegas Ivan "e1" Buetler [email protected] Compass Security AG - Switzerland Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
Malicious Code on Java Card Smartcards: Attacks and Countermeasures Wojciech Mostowski and Erik Poll Digital Security Radboud University Nijmegen To be presented at CARDIS'2008 Erik Poll Radboud University
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Developing secure Java Card applications
Developing secure Java Card applications Jan Vossaert Jorn Lapon Vincent Naessens June 9, 2010 1 Introduction This tutorial covers the basic steps towards secure smart card application development with
An evaluation of the Java Card environment
An evaluation of the Java Card environment Christophe Rippert, Daniel Hagimont Contact: Christophe Rippert, Sirac Laboratory INRIA Rhône-Alpes, 655 avenue de l Europe Montbonnot 38334 St Ismier Cedex,
Characteristics of Java (Optional) Y. Daniel Liang Supplement for Introduction to Java Programming
Characteristics of Java (Optional) Y. Daniel Liang Supplement for Introduction to Java Programming Java has become enormously popular. Java s rapid rise and wide acceptance can be traced to its design
1. Overview of the Java Language
1. Overview of the Java Language What Is the Java Technology? Java technology is: A programming language A development environment An application environment A deployment environment It is similar in syntax
MultiApp ID V2.1. Java Card System. Common Criteria / ISO 15408 Security Target Public version EAL5+ MultiApp ID V2.1 JCS Security Target
MultiApp ID V2.1 Java Card System Common Criteria / ISO 15408 Security Target Public version EAL5+ Copyright Gemalto SA 2012. Page: 1/71 TABLE OF CONTENTS 1 REFERENCE DOCUMENTS... 5 1.1 EXTERNAL REFERENCES
Hardware/Software Co-Design of a Java Virtual Machine
Hardware/Software Co-Design of a Java Virtual Machine Kenneth B. Kent University of Victoria Dept. of Computer Science Victoria, British Columbia, Canada [email protected] Micaela Serra University of Victoria
Description of the Technical Component:
Confirmation concerning Products for Qualified Electronic Signatures according to 15 Sec. 7 S. 1, 17 Sec. 4 German Electronic Signature Act 1 and 11 Sec. 2 and 15 German Electronic Signature Ordinance
Measurement and Analysis Introduction of ISO7816 (Smart Card)
Measurement and Analysis Introduction of ISO7816 (Smart Card) ISO 7816 is an international standard related to electronic identification cards with contacts, especially smart cards, managed jointly by
Smart Card. Smart Card applications
Smart Card Chip Plastic card A very secure way of storing a small amount of sensitive data 1 Smart Card applications Retail Sale of goods using Electronic Purses, Credit / Debit Vending machines Loyalty
INTRODUCTION TO JAVA PROGRAMMING LANGUAGE
INTRODUCTION TO JAVA PROGRAMMING LANGUAGE Today Java programming language is one of the most popular programming language which is used in critical applications like stock market trading system on BSE,
Code Generation for High-Assurance Java Card Applets
Code Generation for High-Assurance Java Card Applets Alessandro Coglio Kestrel Institute 3260 Hillview Avenue, Palo Alto, CA 94304, USA Ph. +1-650-493-6871 Fax +1-650-424-1807 http://www.kestrel.edu/ coglio
MUSCLE Cryptographic Card Edge Definition for Java 1 Enabled Smartcards
MUSCLE Cryptographic Card Edge Definition for Java 1 Enabled Smartcards David Corcoran Tommaso Cucinotta This document is provided on an as-is basis. Neither the authors nor the MUSCLE project are responsible
Java Card Applet Firewall Exploration and Exploitation
Java Card Applet Firewall Exploration and Exploitation Wojciech Mostowski and Erik Poll Digital Security Radboud University Nijmegen The Netherlands http://www.cs.ru.nl/~{woj,erikpoll}/ Introduction Study
Jonathan Worthington Scarborough Linux User Group
Jonathan Worthington Scarborough Linux User Group Introduction What does a Virtual Machine do? Hides away the details of the hardware platform and operating system. Defines a common set of instructions.
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
SIM cards for cellular networks
Mid Sweden University The Department of Information Technology and Media (ITM) Author: Peter Edsbäcker E-mail address: [email protected] Study program: B. Sc. in engineering, computer engineering, 180
Evaluating Elliptic Curve Cryptography for Use on Java Card
Evaluating Elliptic Curve Cryptography for Use on Java Card Nadejda Pachtchenko Master o f Science (M.Sc) Letterkenny Institute o f Technology Dr. Mark Leeney Submitted to the Higher Education and Training
SOSSE. Matthias Brüstle <[email protected]> Simple Operating System for Smartcard Education. Kommunikationsnetz Franken e.v.
Matthias Brüstle Smart Cards mit SOSSE sind lecker 1 SOSSE Simple Operating System for Smartcard Education Matthias Brüstle Kommunikationsnetz Franken e.v. Matthias Brüstle Smart Cards
CardOS API V3.2. Standard cryptographic interface for using applications with CardOS smart cards
API V3.2 API is an integration software for the use of smart cards and security tokens in a variety of applications and heterogeneous operating system environments. API is compatible with international
Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications
in Open Distributed Processing s 1 in Open Distributed Processing s 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 7: 1 2 in Open Distributed Processing s 3 in Open Distributed Processing s Smart s
Java Card Protection Profile Open Configuration
Java Card Protection Profile Open Configuration May 2012 Security Evaluations Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 Java Card Protection Profile Open Configuration 1 Java Card
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Classification of Smart Card Operating Systems
Classification of Smart Card Operating Systems Reza Asgari, Reza Ebrahimi Atani Department of Computer Engineering, Faculty of Engineering, University of Guilan [email protected], [email protected]
The Java Virtual Machine and Mobile Devices. John Buford, Ph.D. [email protected] Oct 2003 Presented to Gordon College CS 311
The Java Virtual Machine and Mobile Devices John Buford, Ph.D. [email protected] Oct 2003 Presented to Gordon College CS 311 Objectives Review virtual machine concept Introduce stack machine architecture
Java in Education. Choosing appropriate tool for creating multimedia is the first step in multimedia design
Java in Education Introduction Choosing appropriate tool for creating multimedia is the first step in multimedia design and production. Various tools that are used by educators, designers and programmers
3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal. Abstract
3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal Source: Gemplus, Oberthur, Schlumberger Title: Over-The-Air (OTA) technology Document for: Discussion and decision Agenda
General Introduction
Managed Runtime Technology: General Introduction Xiao-Feng Li ([email protected]) 2012-10-10 Agenda Virtual machines Managed runtime systems EE and MM (JIT and GC) Summary 10/10/2012 Managed Runtime
Multi-core Programming System Overview
Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Section 1.4. Java s Magic: Bytecode, Java Virtual Machine, JIT,
J A V A T U T O R I A L S : Section 1.4. Java s Magic: Bytecode, Java Virtual Machine, JIT, JRE and JDK This section clearly explains the Java s revolutionary features in the programming world. Java basic
SMARTCARD SECURITY. Java Card Security. Marc Witteman. Introduction
Java Card Security Marc Witteman Introduction Java Card is a new, but fast growing technology that enhances the world of smart cards with a whole set of exciting new possibilities. Until a few years ago
A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.
A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Rev. 3
NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Rev. 3 Rev. 01.02 08 December 2010 BSI-DSZ-CC-0675 Evaluation documentation Document information Info Keywords Abstract Content JCOP, ST, This
Application Programming Interface
Application Programming Interface Java Card Platform, Version 2.2.1 Sun Microsystems, Inc. 4150 Network Circle Santa Clara, California 95054 U.S.A. 650-960-1300 October 21, 2003 Java Card Specification
Developing a new Protection Profile for (U)SIM UICC platforms. ICCC 2008, Korea, Jiju Septembre 2008 JP.Wary/M.Eznack/C.Loiseaux/R.
Developing a new Protection Profile for (U)SIM UICC platforms ICCC 2008, Korea, Jiju Septembre 2008 JP.Wary/M.Eznack/C.Loiseaux/R.Presty Project Background A Protection Profile for (U)SIM Security Requirements
FLY SECURITY TARGET LITE NFC FLY BUY
FLY SECURITY TARGET LITE NFC FLY BUY ISSUE: 1 FQR : 110 5730 Issue: 1 Date : 07/04/2011 1/191 Table of contents 1 PREFACE... 6 1.1 OBJECTIVES OF THE DOCUMENT... 6 1.2 SCOPE OF THE DOCUMENT... 6 1.3 RELATED
SECURITY TARGET-LITE NFC FLYBUY PLATINUM. FQR : 110 5968 Issue: 2 Date : 02/6/2012 1//194
SECURITY TARGET-LITE NFC FLYBUY PLATINUM FLY2 FQR : 110 5968 Issue: 2 Date : 02/6/2012 1//194 Table of contents 1 PREFACE... 7 1.1 OBJECTIVES OF THE DOCUMENT... 7 1.2 SCOPE OF THE DOCUMENT... 7 1.3 RELATED
eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved
eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.
Java and Real Time Storage Applications
Java and Real Time Storage Applications Gary Mueller Janet Borzuchowski 1 Flavors of Java for Embedded Systems Software Java Virtual Machine(JVM) Compiled Java Hardware Java Virtual Machine Java Virtual
2 Introduction to Java. Introduction to Programming 1 1
2 Introduction to Java Introduction to Programming 1 1 Objectives At the end of the lesson, the student should be able to: Describe the features of Java technology such as the Java virtual machine, garbage
Crash Course in Java
Crash Course in Java Based on notes from D. Hollinger Based in part on notes from J.J. Johns also: Java in a Nutshell Java Network Programming and Distributed Computing Netprog 2002 Java Intro 1 What is
Mobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
Replication on Virtual Machines
Replication on Virtual Machines Siggi Cherem CS 717 November 23rd, 2004 Outline 1 Introduction The Java Virtual Machine 2 Napper, Alvisi, Vin - DSN 2003 Introduction JVM as state machine Addressing non-determinism
Java Card 2.1.1 Application Programming Interface
Java Card 211 Application Programming Interface Sun Microsystems, Inc 901 San Antonio Road Palo Alto, CA 94303 USA 650 960-1300 Revision 10, May 18, 2000 Copyright 2000 Sun Microsystems, Inc 901 San Antonio
1 The Java Virtual Machine
1 The Java Virtual Machine About the Spec Format This document describes the Java virtual machine and the instruction set. In this introduction, each component of the machine is briefly described. This
Lesson-3 CASE STUDY OF AN EMBEDDED SYSTEM FOR SMART CARD
Design Examples and Case Studies of Program Modeling and Programming with RTOS-2: Lesson-3 CASE STUDY OF AN EMBEDDED SYSTEM FOR SMART CARD 1 1. Smart Card System Requirements 2 Purpose Enabling authentication
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics Jan Krhovják Outline Introduction and basics of PIV Minimum
Side-Channel Monitoring of Contactless Java Cards
Side-Channel Monitoring of Contactless Java Cards by Jem E. Berkes A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
Whitepaper on identity solutions for mobile devices
Whitepaper on identity solutions for mobile devices How software and hardware features of modern mobile devices can improve the security and user experience of your software Author: Jonas Lindstrøm The
Performance Evaluation of Java Card Bytecodes
Performance Evaluation of Java Card Bytecodes Pierre Paradinas 1, Julien Cordry 2, and Samia Bouzefrane 2 1 INRIA Rocquencourt 78150 Le Chesnay France [email protected] 2 CNAM 292 rue Saint-Martin
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Security Technical Overview Published: 2014-01-17 SWD-20140117135425071 Contents 1 New in this release...10 2 Overview...
System Structures. Services Interface Structure
System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1
BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1 Version: 5.0 Service Pack: 3 Security Technical Overview Published: 2012-01-17 SWD-1936256-0117012253-001 Contents 1 Document revision history...
Cloud Computing. Up until now
Cloud Computing Lecture 11 Virtualization 2011-2012 Up until now Introduction. Definition of Cloud Computing Grid Computing Content Distribution Networks Map Reduce Cycle-Sharing 1 Process Virtual Machines
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
GlobalPlatform. Card Specification. Version 2.2
GlobalPlatform Card Specification Version 2.2 March 2006 Recipients of this document are invited to submit, with their comments, notification of any relevant patent rights or other intellectual property
How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
Topics. Introduction. Java History CS 146. Introduction to Programming and Algorithms Module 1. Module Objectives
Introduction to Programming and Algorithms Module 1 CS 146 Sam Houston State University Dr. Tim McGuire Module Objectives To understand: the necessity of programming, differences between hardware and software,
Information and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
Developing Embedded Software in Java Part 1: Technology and Architecture
Developing Embedded Software in Java Part 1: Technology and Architecture by Michael Barr Embedded Systems Conference Europe The Netherlands November 16-18, 1999 Course #300 Sun s introduction of the Java
JavaPOS TM FAQ. What is an FAQ? What is JavaPOS?
JavaPOS TM FAQ What is an FAQ? An FAQ is a list of frequently asked questions. In addition to supplying background material, this document will provide answers for the most frequently asked questions about
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
RE-TRUST Design Alternatives on JVM
RE-TRUST Design Alternatives on JVM ( - Italy) [email protected] http://softeng.polito.it/falcarin Trento, December, 19 th 2006 Tamper-Detection Tamper-detection goals Detect malicious modifications
02 B The Java Virtual Machine
02 B The Java Virtual Machine CS1102S: Data Structures and Algorithms Martin Henz January 22, 2010 Generated on Friday 22 nd January, 2010, 09:46 CS1102S: Data Structures and Algorithms 02 B The Java Virtual
Chapter 3 Operating-System Structures
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
JAVA 2 Network Security
JAVA 2 Network Security M A R C O PISTOIA DUANE F. RELLER DEEPAK GUPTA MILIND NAGNUR ASHOK K. RAMANI PTR, UPPER http://www.phptr.com PRENTICE HALL SADDLE RIVER, NEW JERSEY 07458 Contents Foreword Preface
Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014
Usable Crypto: Introducing minilock Nadim Kobeissi HOPE X, NYC, 2014 2012 Browsers are an environment that is hostile to cryptography Malleability of the JavaScript runtime. The lack of low-level (system-level)
JavaPOS TM FAQ. What is an FAQ? What is JavaPOS?
JavaPOS TM FAQ What is an FAQ? An FAQ is a list of frequently asked questions. In addition to supplying background material, this document will provide answers for the most frequently asked questions about
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
Nokia 9210i/9290 Communicators and PersonalJava TM Application Development
Nokia 9210i/9290 Communicators and Personal TM Application Development 05-03-2002 Nokia 9210i/9290 Communicators and PersonalTM Application Development Table of contents 1. DIFFERENT JAVA TECHNOLOGIES...
