DOCUMENTATION ON ACPL FM220 RD APPLICATION. Contents
|
|
- Egbert Lang
- 6 years ago
- Views:
Transcription
1 DOCUMENTATION ON ACPL FM220 RD APPLICATION Contents 1 Device Registration Install Test Application Device connection Registration for Device Testing for Registered Devices Scanner Testing Device Settings Option Re-register Option PID Data XML Intent Create Create Intent for Device Info Create Intent Capture Call Intent Call Activity Result... 9 Page 1
2 1. Device Registration: This Application facilitates registration of FM220U fingerprint device with ACPL Management Server and generates digitally signed certificate for UIDAI. After registration of device, this application generates the digitally signed certificate and sends this certificate to different vendor applications for communication with UIDAI Server. RD Service detects a good capture, it does necessary processing / extraction, creates the digitally signed certificate, forms the encrypted PID block, and gives the encrypted PID block back to application along with other details including Device Information. 1.1 Install Test Applications Install ACPL FM220 RD application and ACPL-Aadhaar Auth Demo application from Google Play store in Android phone. First open ACPL FM220 RD application and connect device to mobile. 1.2 Device Connection: After connecting device to mobile it will display pop-up message to allow the application to access device. Give Permission for Device access. Page 2
3 This message will be display if only your device was already registered. Page 3
4 1.3 Registration for Device: If device is not registered yet, then application it will show Pls Register message. To register device, Click on REGISTER DEVICE Button or go to Registered Device (RD) form link in application it will show Pls Register message. To register device, Click on REGISTER DEVICE Button or go to Registered Device (RD) form link Fill the all entries in Device Entry form and click on Submit Button. Enter Device Serial number in Device No Entry. Page 4
5 After registration, open application ACPL FM220 RD. Connect device to mobile and wait for approx five minutes. Application will connect to server to check if registration was successful or not. If device registration was successful, then it will display messages as Registration Success and FM220 Ready. Page 5
6 2. Testing of Registered Device: 2.1 Scanner Testing: After registering device, open ACPL FM220 RD application and connect device to mobile. If device was successfully registered, then it will display FM220 Ready message. Now start taking fingerprint by clicking on Scanner Test Button. Page 6
7 2.2 Device Settings Option: Device settings option is for only developer to change certificate option in application. You have to click 9 times on access computech logo to get Select Certificate option. Note: Any type of change in settings may cause an error. Change only when you are sure about this. Use Production as a default. 2.3 Re-Register Option: Page 7
8 This option is use to Re-register device after changing the device certificate setting. 3. PID Data XML: String capture (String pidoptions); <!--main capture call which takes PidOptions XML data as input and returns PidData XML as output--> String getdeviceinfo (); <!-- utility method to obtain DeviceInfo XML from the RD Service--> <PidOptions ver=""> <!--PidOptions: ver: Version of the PidOtopns spec. currently, it is 1.0. This is necessary to allow applications to gracefully upgrade even when RD service may be been upgraded. RD Service must support current version and one previous version to allow apps to upgrade at different points in time--> <Opts fcount="" ftype="" icount="" itype="" pcount="" ptype="" format="" pidver="" timeout="" otp="" wadh="" posh="" env=""/> <Demo></Demo> <!-- Element allows demographic data to be passed to form PID block as per authentication specification--> <CustOpts> <!-- no application should hard code these and should be configured on app or AUA servers. These parameters can be used for any custom application authentication or for other configuration parameters. Device providers can differentiate their service in the market by enabling advanced algorithms that applications can take advantage of. --> <Param name="" value="" /> </CustOpts> Page 8
9 <!-- Allows vendor specific options to be passed. Param element may repeat--> </PidOptions> /* Opts: Int fcount (optional) number of finger records to be captured (0 to 10) Int ftype (optional) ISO format (0 for FMR or 1 for FIR), 0 (FMR) is default Int icount (optional) number of iris records to be captured (0 to 2) Int itype (optional) ISO format (0 for IIR), 0 (IIR) is default Int pcount (optional) number of face photo records to be captured (0 to 1). Currently face matching is not supported. Int ptype (optional) face format. Currently face matching is not supported. Int format (mandatory) 0 for XML, 1 for Protobuf String pidver (mandatory) PID version Int timeout capture timeout in milliseconds String env (optional) default value being "P"(prod), other valid values are "PP"(preProd) and "S"(Staging). String otp (optional) OTP value captured from user in case of 2-factor auth String wadh (optional) If passed, RD Service should use this within PID block root element as-is. String posh (optional) if specific positions need to be captured, applications can pass a comma delimited position attributes. See posh attribute definition in Authentication Specification for valid values. RD Service (if showing preview) can indicate the finger using this. If passed, this should be passed back within PID block. Default is UNKNOWN, meaning any finger/iris can be captured. */ <PidData> <Resp errcode="" errinfo="" fcount="" ftype="" icount="" itype="" pcount="" ptype="" nmpoints="" qscore=""/> <DeviceInfo /> <Skey ci="">encrypted and encoded session key</skey> <Hmac>SHA-256 Hash of Pid block, encrypted and then encoded</hmac> <Data type="x P"> base-64 encoded encrypted pid block </pid> </PidData> /* Resp: Int errcode (mandatory) 0 if no error, else standard error codes String errinfo (optional) additional info message in case of error/warning Int fcount (mandatory for FP) number of finger records actually captured Int ftype (mandatory for FP) actual format type 0 (FMR) or 1 (FIR) Int icount (mandatory for Iris) number of iris records actually captured Int itype (mandatory for Iris) actual Iris format (0 for IIR) Int pcount (mandatory for Photo) number of face photo records actually captured. Currently face matching is not supported Int ptype (mandatory for Photo) face format. Currently face matching is not supported. Int nmpoints (mandatory for FMR capture) Number of minutiae points when FMR is captured. Applications may use this for accepting or retrying the capture. If multiple fingers are captured, send comma delimited numbers. Int qscore (optional) if quality check is done, send a normalized score that is between 0 and 100. Device providers may allow configuration within RD service to use specific quality check Page 9
10 algorithms to be enabled. Either it can be configured within RD service or applications can pass those under PidOptionsCustOptsParam. Skey: String skey (mandatory) encrypted session key as per auth spec String ci (mandatory) UIDAI public key identifier as per auth spec Hmac: String hmac (mandatory) hmac value as per auth spec */ <DeviceInfo dpid="" rdsid="" rdsver="" dc="" mi="" mc="" /> /* dpid (mandatory) Unique code assigned to registered device provider. rdsid (mandatory) Unique ID of the certified registered device service. rdsver (mandatory) registered devices service version. dc (mandatory) Unique Registered device code. mi (mandatory) Registered device model ID. mc (mandatory) this attribute holds registered device public key certificate. This is signed with device provider key. */ 4. Intent Create: 4.1 Create Intent for Device Info: intentinfo = new Intent("in.gov.uidai.rdservice.fp.INFO"); PackageManager packagemanager = getpackagemanager(); List activities = packagemanager.queryintentactivities(intentinfo,packagemanager.match_default_only ); boolean isintentsafe = activities.size() > 0; if (!isintentsafe) { //"No Finger Scanner Support available" btnauthenticate.setenabled(false); btncapture.setenabled(false); 4.2 Create Intent for Capture Call: intentcapture = new Intent("in.gov.uidai.rdservice.fp.CAPTURE"); Page 10
11 packagemanager = getpackagemanager(); activities = packagemanager.queryintentactivities(intentcapture,packagemanager.match_default_o NLY); isintentsafe = activities.size() > 0; if (!isintentsafe) { //"No Finger Scanner Support available" btnauthenticate.setenabled(false); btncapture.setenabled(false); 5. Intent Call: The integer argument is a request code that identifies your request. When you receive the result Intent, the call back provides the same request code so that application can properly identify the result and determine how to handle it. (For result of this call, refer Activity Result code.) int resultcode = 1; startactivityforresult(intentinfo, resultcode); piddataxml = ""; int resultcode = 13; startactivityforresult(intentcalim, resultcode); int resultcode = 14; startactivityforresult(intentrelease, resultcode); 6. Activity Result: Activity Result is depends as per value passed in intent call. You can change values as per your requirement. <!-- The System calls activity s onactivityresult() method when user will be done with subsequent activity and returns. The onactivityresult() method includes three arguments: 1. The request code passed to startactivityforresult(). 2. A result code specified by the second activity. This is RESULT_OK if the operation was successful. 3. An Intent that carries the result data. --> Page 11
12 protected void onactivityresult(int requestcode, int resultcode, Intent data) { //...USER CODE super.onactivityresult(requestcode, resultcode, data); if (resultcode == Activity.RESULT_OK) { if (requestcode == 1) { String regis_info = data.getstringextra("rdservice"); if (regis_info!= null && regis_info.contains("notready")) { //"YOUR DEVICE IS NOT CONNECTED.or Other error Display"); else{ String deviceinfoxml = data.getstringextra("rdservice"); DeviceInfoXml = data.getstringextra("device_info"); if (DeviceInfoXml!= null) { if (deviceinfoxml == null deviceinfoxml.equals("") deviceinfoxml.isempty()) { //"Error occurred in DEVICE DRIVER INFO XML" else { //as per your requirements else if (requestcode == 2) { piddataxml = data.getstringextra("pid_data"); if (piddataxml!= null) { Page 12
13 //"PID DATA XML :- \n" + piddataxml if (piddataxml.equals("") piddataxml.isempty()) { //"Error occurred in PID DATA XML" return; if (piddataxml.startswith("error:-")) { //piddataxml return; DocumentBuilderFactory db = DocumentBuilderFactory.newInstance(); Document inputdocument = db.newdocumentbuilder().parse(new InputSource(new StringReader(pidDataXML))); NodeList nodes = inputdocument.getelementsbytagname("piddata"); if (nodes!= null) { Element element = (Element) nodes.item(0); NodeList respnode = inputdocument.getelementsbytagname("resp"); if (respnode!= null) {... if (piddataxml!= null) { //deviceinfoxml!= null && //"Scan success" else { //"Scan Failure" else if (requestcode == 3) { //request for application settings else if (requestcode ==13) { String value = data.getstringextra("claim"); //usb connect /disconnect else if (requestcode ==14) { String value = data.getstringextra("release"); //usb release 13
14 else { Following is the XML data format for authentication API: Page <Auth uid="" rc="" tid="" ac="" sa="" ver="" txn="" lk=""> <Uses pi="" pa="" pfa="" bio="" bt="" pin="" otp=""/> <Meta udc="" rdsid="" rdsver="" dpid="" dc="" mi="" mc="" /> <Skey ci="">encrypted and encoded session key</skey> <Hmac>SHA-256 Hash of Pid block, encrypted and then encoded</hmac> <Data type="x P">encrypted PID block</data> <Signature>Digital signature of AUA</Signature> </Auth> The PIDdata received form RDserviec as below <PidData> <Resp errcode="" errinfo="" fcount="" ftype="" icount="" itype="" pcount="" ptype="" nmpoints="" qscore=""/> <DeviceInfo /> <Skey ci="">encrypted and encoded session key</skey> <Hmac>SHA-256 Hash of Pid block, encrypted and then encoded</hmac> <Data type="x P"> base-64 encoded encrypted pid block </pid> </PidData> Data, Skey and HMac elements from Piddata to Auth are to be used as it is. Deviceinfo in Piddata will provide other elements required for Meta. UDC is as per your choice. It should be present but it is not checked. Auth XML is to be signed using UIDAI private key as it was signed in version
RD Client Integration Document
CURRENT VERSION DETAIL Project Name Windows RD service Solution Project Version 2.0.1.11 Prepared By Manish Pandey Approved By Comments Date Prepared 23 rd August Date Approved 23 rd August References
More informationAPI 2.0 Error Handling document
API 2.0 Error Handling document API Error 100 200 "Pi" (basic) attributes of demographic data did not match "Pa" (address) attributes of demographic data did not match User should be allowed to reenter
More informationAADHAAR AUTHENTICATION API SPECIFICATION - VERSION 2.0 (REVISION 1) FEBRUARY
UIDAI Unique Identification Authority of India Planning Commission, Govt. of India (GoI), 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR AUTHENTICATION API SPECIFICATION
More informationAADHAAR AUTHENTICATION API SPECIFICATION VERSION 1.0
UIDAI Unique Identification Authority of India Planning Commission, Govt. of India (GoI), 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR AUTHENTICATION API SPECIFICATION
More informationA National e-authentication Service
e-pramaan A National e-authentication Service State of Art Disparate methods of authentication across e-gov Services Unsecured communication channel for credential exchange in multiple cases Non-availability
More informationAPI SERVICE SPECIFATION For Aadhaar Enabled Payment System. Registered Device
API SERVICE SPECIFATION For Aadhaar Enabled Payment System Registered Device Version: 3.8 Updated Document Version History: Version Change of Description Created Date Created By 3.8 Channel ID mandatory
More informationSecuGen WebAPI Programmer s Manual
SecuGen WebAPI Programmer s Manual SDK version 0.9 Copyright 2018 SecuGen Corporation and its licensors. ALL RIGHTS RESERVED. Information in this document is subject to change without notice. The software
More informationAndroid Documentation Level-0 Registered Device Service
Android Documentation Level-0 Registered Device Service Version: 1.0 2018-07-18 NEXT Biometrics Group AS Universitetsgata 10 0164 Oslo Norway http://www.nextbiometrics.com Level-0 Registered Device Service
More informatione-sign and TimeStamping
e-sign and TimeStamping Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 Recent Developments:
More informationIntroduction to Android Multimedia
Introduction to Android Multimedia CS 436 Software Development on Mobile By Dr.Paween Khoenkaw Android Intent Intent,Intent-filter What is Intent? -Intent is a message sent from one program to another
More informationAndroid Programming Lecture 7 9/23/2011
Android Programming Lecture 7 9/23/2011 Multiple Activities So far, projects limited to one Activity Next step: Intra-application communication Having multiple activities within own application Inter-application
More informationDemographic Update through Update Client Lite (UCL)
CSC e-governance Services India Limited, Ministry of Communications & Information Technology, Electronics Niketan, 3rd Floor, DeitY, 6 CGO Complex, Lodhi Road, New Delhi 110003 Phone : - 011-24301349 Operator
More informationDeveloping Android Applications
Developing Android Applications Introduction to Software Engineering Fall 2015 Updated 21 October 2015 Android Lab 02 Advanced Android Features 2 Class Plan UI Elements Activities Intents Data Transfer
More informationINSTALLATION GUIDE FOR ACPL FM220 RD WINDOWS APPLICATION INDEX
INSTALLATION GUIDE FOR ACPL FM220 RD WINDOWS APPLICATION INDEX CONTENT PAGE No. Setup FM220 RD Service 2 Setup FM220 RD Service Support Tool 5 Instructions to enable HTTPS in RD Service 8 RD Service troubleshooting
More information10.1 Introduction. Higher Level Processing. Word Recogniton Model. Text Output. Voice Signals. Spoken Words. Syntax, Semantics, Pragmatics
Chapter 10 Speech Recognition 10.1 Introduction Speech recognition (SR) by machine, which translates spoken words into text has been a goal of research for more than six decades. It is also known as automatic
More informationAndroid Help. Section 8. Eric Xiao
Android Help Section 8 Eric Xiao The Midterm That happened Any residual questions? New Assignment! Make a low-fi prototype Must be interactive Use balsamiq or paper Test it with users 3 tasks Test task
More informationUSER MANUAL/INSTALLATION GUIDE
USER MANUAL/INSTALLATION GUIDE UPDATE CLIENT LITE (UCL) APP.QUL.TEM.005 Ver. 1.1 UIDAI Internal Page 1 of 31 Table of Contents 1. Introduction... 4 1.1. Purpose... 4 1.2. Scope... 4 1.3. Audience... 4
More informationIslamic University of Gaza. Faculty of Engineering. Computer Engineering Department. Mobile Computing ECOM Eng. Wafaa Audah.
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Mobile Computing ECOM 5341 By Eng. Wafaa Audah July 2013 1 Launch activitits, implicit intents, data passing & start activity
More informationDROIDS ON FIRE. Adrián
DROIDS ON FIRE Adrián Catalán @ykro https://goo.gl/ ige2vk Developer experience matters Cross-platform Integrated Getting Started with Firebase http://github.com /ykro/wikitaco App.java @Override
More informationGolden Gate Application: Training. Golden Gate (GG) App Training Manual
Golden Gate Application: Training Golden Gate (GG) App Training Manual Pre-Requisites: Supported Biometric Devices on GG apk v1.7 Devices Supported: Mantra-tech Unlocked Morpho Make sure you take OTG micro-usb
More informationIntegration Architecture Of SDMS
Integration Architecture Of SDMS 20 May 2017 Version 1.0 (Rakesh Ranjan, Consultant-IT) Table of Content 1 ABOUT SDMS...2 2 OBJECTIVE & STRUCTURE OF THIS DOCUMENT...2 3 TRANSACTIONAL SERVICES...3 3.1 HIGH
More informationMetaMoJi Share for Business Ver. 3 MetaMoJi Note for Business Ver. 3 Administrator s Guide
MetaMoJi Share for Business Ver. 3 MetaMoJi Note for Business Ver. 3 Administrator s Guide Second Edition - ios is a trademark or registered trademark of Cisco in the U.S. and other countries and is used
More informationWriting Efficient Drive Apps for Android. Claudio Cherubino / Alain Vongsouvanh Google Drive Developer Relations
Writing Efficient Drive Apps for Android Claudio Cherubino / Alain Vongsouvanh Google Drive Developer Relations Raise your hand if you use Google Drive source: "put your hands up!" (CC-BY) Raise the other
More information1WorldSync Content1 Web Services
1WorldSync Content1 Web Services API HMAC Guide Version 1.1 26-Oct-2016 2 REVISION HISTORY Date Ver # Description of Change Author October 14, 2015 1.0 Initial Version 1WorldSync October 26, 2016 1.1 Updated
More informationAEBAS HELP FILE. 2. Kathua Satender Singh Udhampur Sanjeev
AEBAS HELP FILE This is for the information of all employees of Jammu province under Directorate of School Education, Jammu. A lot of queries are pouring in from the employees registered under AEBAS, (AADHAAR
More informationSMAATSDK. NFC MODULE ON ANDROID REQUIREMENTS AND DOCUMENTATION RELEASE v1.0
SMAATSDK NFC MODULE ON ANDROID REQUIREMENTS AND DOCUMENTATION RELEASE v1.0 NFC Module on Android Requirements and Documentation Table of contents Scope...3 Purpose...3 General operating diagram...3 Functions
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationDevice Recognition Best Practices Guide
Copyright Information 2017. SecureAuth is a copyright of SecureAuth Corporation. SecureAuth s IdP software, appliances, and other products and solutions, are copyrighted products of SecureAuth Corporation.
More informationOT MORPHO RD Service for Windows
OT MORPHO RD Service for Windows Classification: OT-MORPHO Restricted Version 1.1 Page 1 of 10 Table of Contents 1. Introduction...3 1.1. Purpose...3 2. S/W and H/W Requirement...3 2.1. Prerequisites for
More informationOverview. Lecture: Implicit Calling via Share Implicit Receiving via Share Launch Telephone Launch Settings Homework
Implicit Intents Overview Lecture: Implicit Calling via Share Implicit Receiving via Share Launch Telephone Launch Settings Homework Intents Intent asynchronous message used to activate one Android component
More informationUsing Libraries, Text-to-Speech, Camera. Lecture 12
Using Libraries, Text-to-Speech, Camera Lecture 12 Libraries Many Android developers have produced useful libraries. There is a Maven repository to store various libraries This makes it easy to add them
More informationTopics Covered in the Android Apps Development Training
Topics Covered in the Android Apps Development Training 1. Android Architecture sdk, jdk, class files,.dex, installation, sdk manager, avd manager, avd configurations, emulator, Android Framework Versions,
More informationCIS 4360 Secure Computer Systems Biometrics (Something You Are)
CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationTerms: MediaPlayer, VideoView, MediaController,
Terms: MediaPlayer, VideoView, MediaController, Sisoft Technologies Pvt Ltd SRC E7, Shipra Riviera Bazar, Gyan Khand-3, Indirapuram, Ghaziabad Website: www.sisoft.in Email:info@sisoft.in Phone: +91-9999-283-283
More informationInternet security and privacy
Internet security and privacy IPsec 1 Layer 3 App. TCP/UDP IP L2 L1 2 Operating system layers App. TCP/UDP IP L2 L1 User process Kernel process Interface specific Socket API Device driver 3 IPsec Create
More informationFeature Comparison Checklist
Feature Comparison Checklist We invite you to use this checklist to help guide your team in identifying your mobile forms requirements. This checklist also provides an easy way to compare the Formotus
More informationTungsten Security Whitepaper
Tungsten Labs UG (haftungsbeschränkt) Email: contact@tungsten-labs.com Web: http://tungsten-labs.com Monbijouplatz 5, 10178 Berlin Tungsten Security Whitepaper Berlin, May 2018 Version 1 Contents Introduction
More informationDell EMC OpenManage Mobile. Version User s Guide (Android)
Dell EMC OpenManage Mobile Version 2.0.20 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION
More informationVersion 1.4. Cogent VDM and Device Guide
Version 1.4 Cogent VDM and Device Guide 2010 Cogent, Inc. All rights reserved. This document contains commercial information and trade secrets of Cogent, Inc. which are confidential and proprietary in
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : C_THR82_1608 Title : SAP Certified Application Associate - SAP SuccessFactors Performance and Goal Management Q3/2016
More informationCS 193A. Multiple Activities and Intents
CS 193A Multiple Activities and Intents This document is copyright (C) Marty Stepp and Stanford Computer Science. Licensed under Creative Commons Attribution 2.5 License. All rights reserved. Multiple
More informationSecuring ArcGIS Services
Federal GIS Conference 2014 February 10 11, 2014 Washington DC Securing ArcGIS Services James Cardona Agenda Security in the context of ArcGIS for Server Background concepts Access Securing web services
More informationBiometric Sensor SDK. Integration Guide 4.17
Biometric Sensor SDK Integration Guide 4.17 Disclaimer Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2013 2017 VASCO Data Security, Inc., VASCO Data Security International
More informationesign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5,
esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5, 2 0 1 7 Presentation Outline e-sign Architecture Interesting Challenges
More informationAuthentication Provider - Facebook. Setup Guide
Authentication Provider - Facebook Setup Guide Disclaimer THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN ( MATERIAL ) IS PROVIDED FOR GENERAL INFORMATION PURPOSES ONLY. GLOBAL REACH AND ITS LICENSORS
More informationPAYWISER MINIPOS INTEGRATION GUIDE
PAYWISER MINIPOS INTEGRATION GUIDE TECHNICAL DOCUMENTATION Developed by: CEBASEK Denmark s.r.o. CVR-nr: 36725168 Industriområdet 107 8732 Hovedgård Denmark Slovenian sales and developlent partner: OMNIPOS
More informationAndroid Programming Lecture 8: Activities, Odds & Ends, Two New Views 9/28/2011
Android Programming Lecture 8: Activities, Odds & Ends, Two New Views 9/28/2011 Return Values from Activities: Callee Side How does the Sub-Activity send back a response? Create an Intent to return Stuff
More informationSphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data
Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker
More informationCQ Beacon Android SDK V2.0.1
Copyright 2014 ConnectQuest, LLC 1 CQ Beacon Android SDK V2.0.1 Software Requirements: Android 4.3 or greater SDK Support Page: http://www.connectquest.com/app- developers/android- api/ The CQ SDK package
More informationJrsys Mobile Banking Solutions
Jrsys Mobile Banking Solutions Jrsys International corp. James Wu Mobile PKI solutions 1.Mobile CA 2.Mobile RA 3.Mobile Signing and Validation Service CA Mobile Signature/ Encryption Mobile PKI Mobile
More informationLIFE INSURANCE CORPORATION OF INDIA CENTRAL OFFICE IT/BPR DEPARTMENT
S.No. RFP Document Reference (s) (Section & Page Number) 1 Page 39, 6.1 Part A,r LIFE INSURANCE CORPORATION OF INDIA CENTRAL OFFICE IT/BPR DEPARTMENT Clause (in brief) of RFP requiring clarification (S)
More informationBeacon Configuration
The Radius Networks beacon hardware supports Google Nearby Notifications. As a courtesy to our customers, we have developed documentation explaining how to create these notifications using our hardware
More informationCMS-i First Time Activation User Guide
Download Soft Token Application (ios Application) Download Soft Token Application (Android Application) First Time Activation Soft Token Registration Version : 4.0 Last updated : 22 nd February 2019 alrajhicashbiz24seven
More informationAET60 API version 1.4 February Introduction...3 Features...3 Application Programming Interface...4
Version 1.4 02-2007 Unit 1008, 10th Floor, Hongkong International Trade and Exhibition Centre 1 Trademart Drive, Kowloon Bay, Hong Kong Tel: +852 2796 7873 Fax: +852 2796 1286 Email: info@acs.com.hk Website:
More informationWorkshop. 1. Create a simple Intent (Page 1 2) Launch a Camera for Photo Taking
Workshop 1. Create a simple Intent (Page 1 2) Launch a Camera for Photo Taking 2. Create Intent with Parsing Data (Page 3 8) Making Phone Call and Dial Access Web Content Playing YouTube Video 3. Create
More informationThis document is the technical reference for Signaturgruppens Authentication Plugin client library.
1 Introduction This document is the technical reference for Signaturgruppens Authentication Plugin client library. The Authentication Plugin consist of a single.net 4.5 DLL (AuthenticationPlugin.dll),
More informationMobile ID, the Size Compromise
Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1 Presentation Plan The quest for increased matching accuracy. Increased adoption
More informationSecurity Provider Integration SAML Single Sign-On
Security Provider Integration SAML Single Sign-On 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the
More informationID: Sample Name: numbering.xml Cookbook: defaultandroidfilecookbook.jbs Time: 05:15:39 Date: 27/04/2018 Version:
ID: 92 Sample Name: numbering.xml Cookbook: defaultandroidfilecookbook.jbs Time: 0:1:9 Date: 2/04/201 Version: 22.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection
More informationDell EMC OpenManage Mobile. Version 3.0 User s Guide (Android)
Dell EMC OpenManage Mobile Version 3.0 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION
More informationCitrix Ready Workspace Hub by NComputing (NComputing RX-HDX)
Citrix Ready Workspace Hub by NComputing (NComputing RX-HDX) Installation and Configuration Contents Overview... 3 About Citrix Ready workspace hub by NComputing... 3 System Requirements... 2 Upgrade RX-HDX...
More informationSecurity Provider Integration: SAML Single Sign-On
Security Provider Integration: SAML Single Sign-On 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property
More informationIntroducing Android Open Accessories and ADK. Jeff Brown, Erik Gilling, Mike Lockwood May 10, 2011
Introducing Android Open Accessories and ADK Jeff Brown, Erik Gilling, Mike Lockwood May 10, 2011 Session Feedback http://goo.gl/ieddf Twitter: #io2011 #Android 3 USB on Android Yesterday Android USB device
More informationClarification to Bidders Batch no.: 3 RFP No. 38/S/HAAD/PT/ Patient ID Authentication Clarification issue date : 17-Jan- 2015
Q. S/R Questions & Answers 1. Q. Page 12 of the RFP requests that the service should Procure, configure and deploy related hardware and communication infrastructure at the HAAD specified data Centre, can
More informationVendor: SUN. Exam Code: Exam Name: Sun Certified Web Component Developer for J2EE 5. Version: Demo
Vendor: SUN Exam Code: 310-083 Exam Name: Sun Certified Web Component Developer for J2EE 5 Version: Demo QUESTION NO: 1 You need to store a Java long primitive attribute, called customeroid, into the session
More informationNote: Before running the app, turn on the mobile data connection of the mobile phone or connect the mobile phone to a Wi-Fi network.
MyOximeter Operation Instruction I. Download and Installation This app runs in ios 7.0 and later versions and Android 4.3 and later versions of mobile phone operating systems. You can download the app
More informationPulse Secure Mobile Android Release 6.3.0
Pulse Secure Mobile Android Release 6.3.0 Pulse Secure Mobile 6.3R1 for Android (build # 6.3.0. r235864.19) Pulse Secure Client Release 6.3R1 Document Revision 1.0 Published: 2017-07-10 2017 by Pulse Secure,
More informationUNIFIED PAYMENTS INTERFACE
UNIFIED PAYMENTS INTERFACE COMMON URL SPECIFICATIONS FOR DEEP LINKING AND PROXIMITY INTEGRATION UPI Linking Specifications Version 1.5.1 (Draft) National Payments Corporation Of India Page 1 of 9 Contents
More informationPublic Key Infrastructure & esign in India November 2015
Public Key Infrastructure & esign in India November 2015 Vikash Chourasia CDAC Noida Controller of Certifying Authorities Department of Electronics and Information Technology Ministry of Communications
More informationFORT Mobile SDK for Android
FORT Mobile SDK for Android Merchant Integration Guide Document Version: 2.4 February, 2018 Copyright Statement All rights reserved. No part of this document may be reproduced in any form or by any means
More informationBootstrap your APEX authentication & authorisation. a presentation by
Bootstrap your APEX authentication & authorisation a presentation by Who am I? Richard Martens independant Consultant since 2012 smart4apex founding member (2010) oracle since 2002 (Oracle 8i) PL/SQL,
More informationPSD2 webinar session - Q&A
PSD2 webinar session - Q&A Q: How does hardware based solutions such as OTP tokens will provide dynamic linking with single transactions? In general, users can enter payment information, such as the amount
More informationdevice management The following policies can be applied to Knox container of Samsung devices. [Android OS, Samsung Only(Knox2+)]
Knox container device management policy The following policies can be applied to Knox container of Samsung devices. System group Screen capture Clipboard Share list Google account synchronization App crash
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationSecurity Provider Integration SAML Single Sign-On
Security Provider Integration SAML Single Sign-On 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the
More informationID: Sample Name: [Content_Types].xml Cookbook: defaultandroidfilecookbook.jbs Time: 05:15:19 Date: 27/04/2018 Version: 22.0.
ID: 92 Sample Name: [Content_Types].xml Cookbook: defaultandroidfilecookbook.jbs Time: 0:1:19 Date: 2/04/201 Version: 22.0.0 Table of Contents Table of Contents Analysis Report Overview General Information
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationPrivatizing user credential information of Web services in a shared user environment
Selected for proceedings of NETs2012 International Conference on Internet Studies held in Bangkok, Thailand from August 17-19, 2012 Privatizing user credential information of Web services in a shared user
More informationHappyFox API Technical Reference
HappyFox API Technical Reference API Version 1.0 Document Version 0.1 2011, Tenmiles Corporation Copyright Information Under the copyright laws, this manual may not be copied, in whole or in part. Your
More informationRelease Notes for RFD8500 V1.8.R03 Released 23 April 2017
Release Notes for RFD8500 V1.8.R03 Released 23 April 2017 Contents Introduction... 1 Software Deliverables... 1 Changes since 1.7.R00... 3 Important Notes... 4 Known Issues... 4 Introduction These release
More informationMobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar.
Mobile Payment Application Security Security steps to take while developing Mobile Application s About SISA Payment Security Specialists PCI Certification Body (PCI Qualified Security Assessor) Payment
More informationSupported 3rd Party Authentication Providers for Odyssys
Supported 3rd Party Authentication Providers for Odyssys 1. Introduction... 3 1.1 Authentication Provider Menu... 3 1.2 Gateway Configuration... 4 2. Google+/Google Apps... 4 2.1 Prerequisites... 4 2.2
More informationMetaMoJi ClassRoom Administrator s Guide
MetaMoJi ClassRoom Administrator s Guide Third Edition - ios is a trademark or registered trademark of Cisco in the U.S. and other countries and is used under license. - Apple and ipad are registered trademarks
More informatione-authentication guidelines for esign- Online Electronic Signature Service
e-authentication guidelines for esign- Online Electronic Signature Service (Issued under Electronic Signature or Electronic Authentication Technique and Procedure Rules, 2015) Version 1.3 April 2017 Controller
More informationAadhar card photo id software. Aadhar card photo id software.zip
Aadhar card photo id software Aadhar card photo id software.zip 17/04/2013 Freedom fighter photo card Government photo ID cards Aadhaar UID Biometric Card How To Aadhaar UID Biometric Card How To Enrollment
More informationFencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1
Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.
More informationBHARATH SANCHAR NIGAM LIMITED
BHARATH SANCHAR NIGAM LIMITED (A Govt. of India Enterprise) Operational Manual Prepared by ITPC, Hyderabad Wings Operational Manual Page 1 of 19 NOTICE This is a controlled document. Unauthorised access,
More informationGrandstream Networks, Inc.
Grandstream Networks, Inc. IPVideoTalk Cloud Conferencing System Table of Contents OVERVIEW... 3 Prerequisites... 3 HOW TO JOIN A MEETING... 4 Download IPVideoTalk Mobile App... 4 Join a Meeting via Mobile
More informationUsing Intents to Launch Activities
Using Intents to Launch Activities The most common use of Intents is to bind your application components. Intents are used to start, stop, and transition between the Activities within an application. The
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : SY0-301 Title : CompTIA Security+ Certification Exam (SY0-301) Vendor : CompTIA Version : DEMO 1 / 5 Get Latest & Valid
More informationGuide to apply Online for Haj B) The GUIDELINES for Haj-2016 are applicable for online applications also.
Guide to apply Online for Haj-2016 A) To apply Online for Haj -2016, you need: 1. Computer with internet, printer, scanner/smart phone 2. A valid E-mail ID B) The GUIDELINES for Haj-2016 are applicable
More informationITdumpsFree. Get free valid exam dumps and pass your exam test with confidence
ITdumpsFree http://www.itdumpsfree.com Get free valid exam dumps and pass your exam test with confidence Exam : C_AFARIA_02 Title : SAP Certified Application Associate - SAP Afaria 7.0 Administration (SP04)
More informationDell EMC OpenManage Mobile. Version User s Guide (ios)
Dell EMC OpenManage Mobile Version 2.0.20 User s Guide (ios) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION
More informationAadhaar. Scalability & Data Management Challenges. Dr. Pramod K. Varma. Chief Architect, UIDAI
Aadhaar Scalability & Data Management Challenges Dr. Pramod K. Varma Chief Architect, UIDAI twitter.com/pramodkvarma pramodkvarma.com Understanding Aadhaar System 2 Establishing ID is a Challenge Issue
More informationRelease Notes - MC67NA Android KK Update Image AJ22-K-00-M
Release Notes - MC67NA Android KK Update Image 03-20-01-4AJ22-K-00-M1-081917 Introduction Description Contents Device Compatibility Installation Requirements Installation Instructions Known issues Part
More informationVMware Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments
VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation
More informationMore than just being signed-in or signed-out. Parul Jain, Architect,
More than just being signed-in or signed-out Parul Jain, Architect, Intuit @ParulJainTweety Why do we care? TRUST & SECURITY EASE OF ACCESS Can t eliminate friction? Delay it Authentication Levels to balance
More informationUser Guide Parser add-on. Version: September by AgileBio. &
User Guide Parser add-on Version: September 2016 2016 by AgileBio. www.agilebio.com & www.labcollector.com Summary 1- INTRODUCTION... 3 2- GETTING STARTED... 4 3- OVERVIEW... 5 4- TEMPLATE/MODEL... 6 4-1.
More informationUSB Type-C Authentication
USB Type-C Authentication Stephanie Wallick Intel USB Developer Days 2017 Taipei, Taiwan October 24 25, 2017 1 USB Type-C Authentication Introduction Architecture Protocol Certificates 2 Specification
More informationMicrosoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811
Microsoft Intune App Protection Policies Integration VMware Workspace ONE UEM 1811 Microsoft Intune App Protection Policies Integration You can find the most up-to-date technical documentation on the VMware
More information