SMART CARDS APPLET DEVELOPMENT. Miguel Monteiro FEUP / DEI
|
|
- Albert Johns
- 5 years ago
- Views:
Transcription
1 SMART CARDS APPLET DEVELOPMENT Miguel Monteiro FEUP / DEI
2 JAVA SUPPORTED IDES Actual Java Card major version is now 3 (from 2009) It occurs in two flavors Java Card Classic (supported by the majority of card makers) Java Card Connected (scarcely available) Last update is version (from 2015) In this last version, Oracle changed the official IDE Until the IDE is Netbeans (that includes the runtime environment for Connected 3.0.2) In an Eclipse plugin is supplied and the runtime does not run in Netbeans anymore There are many others 3 rd party development tools From the main makers Gemalto, Oberthur, Morpho (Safran), (with a high price) jcardsim (free for Java Card 2.2) ( 2
3 NETBEANS Get the complete package from netbeans.org Select the Java Card 3 Connected package during installation 3
4 LATEST VERSION From the Oracle site for Java Card 4
5 ECLIPSE Install Eclipse and after that install the plugin From Help Install New Software (Add) Select the plugin archive (the.zip file) 5
6 APPLET INFO An Applet has a package and a class (from Applet) Both have a unique AID with the first 5 bytes common The project is created with a very simple applet skeleton. 6
7 THE SKELETON APPLET CODE create.script select.script 7
8 A HELLO APPLET Accepts a single command, and returns Hello Returns the sequence { 48 h, 65 h, 6c h, 6c h, 6f h } It responds only to the APDU (base 16): B
9 PROCESSING THE INCOMING APDU APDU bytes are in a Java Card allocated buffer OFFSET_CLA There is just one buffer for all applets Its size can be less than the transmitted bytes OFFSET_INS OFFSET_P1 OFFSET_CDATA OFFSET_P2 OFFSET_LC CDATA APDU Buffer Only the first 5 bytes are guaranteed to be in the buffer when process() is called. If for this APDU input data is expected, it is necessary to read them with short setincomingandreceive() (APDU method) It puts incoming bytes in the CDATA area of the buffer, but those bytes can be short of the total. The method returns the valid bytes transferred The total incoming bytes can be obtained with getincominglength() or reading the buffer at OFFSET_LC Further incoming bytes are transferred to the CDATA area with short receivebytes(short offset) that returns the number of bytes transferred to the position offset of the APDU buffer. 9
10 BUILDING THE OUTGOING APDU The same buffer is used for the response APDU Its size can be not enough for all the outgoing bytes In that case the response should be sent in chunks - A call to short setoutgoing() allows the use of the APDU buffer to store the response bytes and returns the expected number of outgoing bytes. - Next, the number of bytes to send should be indicated calling setoutgoinglength(short len) - After putting those bytes in some part of the APDU buffer, they are actually sent with a call to sendbytes(short offset, short len) - If the number of bytes doesn t fit in the buffer we can call sendbytes() multiple times. There Is also a convenience method for long responses using sendbyteslong( ) that manages automatically the APDU buffer. - After sending all the bytes the status bytes are also automatically sent. - All the above calls can be replaced by a single call to setoutgoingand Send(short offset, short len) if all the outgoing bytes fit into the APDU buffer. To send an error status, call the static method ISOException.throwIt(short code). Many error codes are already defined as constants in the ISO7816 static class. 10
11 A MORE ELABORATE EXAMPLE Purse protected with a 6 digit PIN Features Takes notes of small amounts of money Has a protection PIN with 3 tries Operations of credit and debit require the PIN There is a maximum amount in the purse ( ) There an operation to get the total, without the PIN The PIN is initialized at install Operations EnterPIN INS = 0x10 Credit INS = 0x20 Debit INS = 0x30 GetTotal INS = 0x40 11
12 12 DEMO Purse with Eclipse
13 SENSITIVE INFORMATION It is possible to intercept the communication between card and card reader For sensitive information that info can be encrypted using asymmetric keys Problem: card personalization, after applet is installed How Or Card can generate key pairs, but outputting just one of them Or a CSR with a public key Can have a command to store a key (or a certificate) These types of commands should be executed only once We can enforce it using a boolean to control the execution We can provide a temporary applet just for personalization After personalization using this second applet, it is deleted from the card (security domain owner) It can be reinstalled later for modifications (security domain owner) 13
14 COMMUNICATION BETWEEN APPLETS Applets in the same security domain can talk One of them will be the server and the other the client The server defines a Shareable java interface The Java Card framework defines the empty interface Shareable { } The server should derive an interface that extends it One object of the server Applet should implement it The client Applet can ask for this object calling the framework getappletshareableinterfaceobject( ) The server needs to override from the Applet class the method getshareableinterfaceobject( ) The server should verify the client identity Asymmetric keys Challenge - Response 14
15 COMMUNICATION SCHEME Java Card Runtime Environment getappletshareabeinterfaceobject() AID Client Applet return the SIO invoke a method return from method firewall return the SIO AID SIO Shareable interface and SIO getshareableinterfaceobject() Server Applet 15
16 AUTHENTICATION SCHEME Client implements AuthInterface challenge(byte[] buffer) Server implements ServiceShareableInterface someop(authinterface client, byte[] buffer, ) aid = lookupaid(buffer, 0, len); sio = getappletshareableinterfaceobject(aid, par); sio.someop(this, buffer, ); public void challenge(byte[] buffer) { respondtochallenge(buffer); } overrides getshareableinterfaceobject(aid client, par) public void someop(authinterface client, byte[] buffer, ) { generatechallenge(buffer); client.challenge(buffer); if (!checkresponse(buffer)) ISOException.throwIt(SW_UNAUTHORIZED_CLIENT); } Shareable Interface Objects can communicate only using primitive values static fields that do not contain references to objects global arrays - the APDU buffer is a global array (it is cleaned when process() returns) 16
17 INITIALIZATION THROUGH 2 ND APPLET We can use the following schema After performing the initialization Applet B is removed from the card The initialization involved creating a key pair in the card Getting the public key Putting it into a CSR and getting a certificate from a CA Putting the user certificate (signed by the CA) in the card 17
Java Card 2.0 Application Programming Interfaces
Java Card 20 Application Programming Interfaces October 13, 1997 Revision 10 Final 1997 Sun Microsystems, Inc 1997 Sun Microsystems, Inc 901 San Antonio Road, Palo Alto, California 94303-4900 USA This
More informationSMART CARDS. Miguel Monteiro FEUP / DEI
SMART CARDS Miguel Monteiro apm@fe.up.pt FEUP / DEI WHAT IS A SMART CARD Distinguishable characteristics Can participate in automated electronic transactions Used primarily to add security Not easily forged
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Smart Cards (JavaCard) University of Tartu Spring 2018 1 / 22 Smart Card Security Model Parties involved in a smart card based system: Cardholder Data owner Terminal owner
More informationDRAFT. class javacardx.framework.linearfixedfile. class javacardx.framework.cyclicfile class javacardx.framework.transparentfile
Java Card 20 API, copyright Sun Microsystems Inc API User s Guide Class Hierarchy Index Java Card 20 API Other Packages package javacardframework package javacardxcrypto package javacardxframework - 1
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Smart Cards (JavaCard) University of Tartu Spring 2017 1 / 23 Security Model Parties involved in smart card based system: Cardholder Data owner Terminal Card issuer Card
More informationA Type System for Checking Applet Isolation in Java Card
A Type System for Checking Applet Isolation in Java Card Peter Müller ETH Zürich Joint work with Werner Dietl and Arnd Poetzsch-Heffter Applet Isolation 2 Applet Context 1 Firewall Applet Context 2 SIO
More informationSecure Object Sharing in Java Card
Secure Object Sharing in Java Card Michael Montgomery Austin Product Center Schlumberger Austin, TX 78726 mmontgomery@slb.com Ksheerabdhi Krishna Austin Product Center Schlumberger Austin, TX 78726 kkrishna@slb.com
More informationJava Card 3 Platform. Peter Allenbach Sun Microsystems, Inc.
Java Card 3 Platform Peter Allenbach Sun Microsystems, Inc. Agenda From plastic to Java Card 3.0 Things to know about Java Card 3.0 Introducing Java Card 3.0 Java Card 3.0 vs. Java SE Java Card 3.0 vs.
More informationbasic schemes, memory types: transient vs. persistent, garbage collection basic schemes, system-level vs. user-level transactions
Overview A. Basic machinery execution model, byte code vs. native code, language aspects B. Memory management basic schemes, memory types: transient vs. persistent, garbage collection C. Atomicity and
More informationFujitsu mpollux DigiSign Client Technical References
Fujitsu mpollux DigiSign Client Technical References This reference document contains technical information necessary for system administrators, who are installing Fujitsu mpollux DigiSign Client in their
More informationJava Card 2.0 Programming Concepts. October 15, 1997 Revision 1.0 Final 1997 Sun Microsystems, Inc.
Java Card 2.0 Programming Concepts Revision 1.0 Final 1997 Sun Microsystems, Inc. 1997 Sun Microsystems, Inc. 901 San Antonio Road, Palo Alto, California 94303-4900 U.S.A. This document is protected by
More informationvsec:cms S-Series Introduction Release Notes Release October 16 th, 2018
vsec:cms S-Series Release Notes Release 5.3.0.0 October 16 th, 2018 Introduction This document provides information about the vsec:cms S-Series product suite release. The information provided in this document
More informationAPDU-Test Card Functional Requirements
Autor Andreas Schwier Version V1.1 Datum 03. January 2012 Copyright 2012 CardContact Software & System Consulting The authors of this documentation make no representation or warranty regarding whether
More informationIDGo Middleware and SDK for Mobile Devices
Smartjac Industries Inc. - Kanalvägen 1A 2nd floor SE-194 61 Upplands Väsby Sweden www.smartjac.com / www.smartjac.biz Phone: +46(8)41071230 - Email: order@smartjac.com IDGo 800 - Middleware and SDK for
More informationSIM Smart Card Overview
SIM Smart Card Overview Smart Card Introduction 2 Java Card Java Card Based SIM Development Environment Service Examples 3 Smart Cards? A smart card is a plastic card that contains an embedded integrated
More informationUSB Key as an active device of Security System
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011 161 USB Key as an active device of Security System Mohammed Nasir Uddin 1, Selina Sharmin 2, Abu Hasnat
More informationSecurity-by-Contract for Open Multi-Application Smart Cards
Security-by-Contract for Open Multi-Application Smart Cards O.Gadyatskaya, F. Massacci (University of Trento) B. Chetali, Q.-H. Nguyen (Trusted Labs, Gemalto) e-smart 2011 September 21-23, Sophia-Antipolis
More informationIDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller
IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart
More informationGuide Installation and User Guide - Mac
Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign
More informationvsec:cms S-Series Introduction Release Notes Release April 27 th, 2018
vsec:cms S-Series Release Notes Release 5.1.0.0 April 27 th, 2018 Introduction This document provides information about the vsec:cms S-Series product suite release. The information provided in this document
More informationCMSC131. Library Classes
CMSC131 Designing Classes Library Classes Due to Java being 100% object-oriented, all code must live inside a class but there is some functionality/information that might be best kept in a more central
More informationCard Specification Amendment A March 2004
Card Specification 2.1.1 March 2004 Use of this information is governed by the GlobalPlatform license agreement and any use inconsistent with that agreement is strictly prohibited. 2 GlobalPlatform Card
More informationCHAPTER 7 OBJECTS AND CLASSES
CHAPTER 7 OBJECTS AND CLASSES OBJECTIVES After completing Objects and Classes, you will be able to: Explain the use of classes in Java for representing structured data. Distinguish between objects and
More informationSecurity Implications of Memory Use on Java Card Platform
Masaryk University Faculty of Informatics Security Implications of Memory Use on Java Card Platform Master s Thesis Ashwin Arvind Yakkundi Chennai, December 2017 Masaryk University Faculty of Informatics
More informationCHAPTER 7 OBJECTS AND CLASSES
CHAPTER 7 OBJECTS AND CLASSES OBJECTIVES After completing Objects and Classes, you will be able to: Explain the use of classes in Java for representing structured data. Distinguish between objects and
More informationJava Card Technology Overview
CHAPTER3 Java Card Technology Overview Java Card technology enables programs written in the Java programming language to run on smart cards and other resource-constrained devices. This chapter gives an
More informationChapter 1 Introduction to Computers, Programs, and Java
Chapter 1 Introduction to Computers, Programs, and Java 1.1 What are hardware and software? 1. A computer is an electronic device that stores and processes data. A computer includes both hardware and software.
More information13 th Windsor Regional Secondary School Computer Programming Competition
SCHOOL OF COMPUTER SCIENCE 13 th Windsor Regional Secondary School Computer Programming Competition Hosted by The School of Computer Science, University of Windsor WORKSHOP I [ Overview of the Java/Eclipse
More informationFINEID - S1 v2.1 Electronic ID Application
FINEID SPECIFICATION 5.12.2011 FINEID - S1 v2.1 Electronic ID Application Application Note 1 Population Register Centre (VRK) Certification Authority Services P.O. Box 70 FIN-00581 Helsinki Finland http://www.fineid.fi
More informationTechnical Bulletin: CAC Data Model Change in 144K Dual Interface Cards
DEPARTMENT OF DEFENSE HUMAN RESOURCES ACTIVITY DEFENSE MANPOWER DATA CENTER DoD CENTER MONTEREY BAY 400 GIGLING ROAD SEASIDE, CALIFORNIA 93955-6771 To: DoD CAC Application and Testing Community From: Defense
More informationSmartcards. ISO 7816 & smartcard operating systems. Erik Poll Digital Security Radboud University Nijmegen
Smartcards ISO 7816 & smartcard operating systems Erik Poll Digital Security Radboud University Nijmegen 1 Standard for contact smartcards ISO7816 7816-1 Physical characteristics 7816-2 Dimension & size
More informationT Smart Card Application Development. Spring 2003 Lecture 3: Applet development basics
T-110.497 Smart Card Application Development Spring 2003 Lecture 3: Applet development basics Development process Java files Java compiler Class files Java Card simulator Export files Java Card converter
More informationSecurity Properties and Java Card Specificities To Be Studied in the SecSafe Project
Security Properties and Java Card Specificities To Be Studied in the SecSafe Project Date: 2001/08/23 08:40:24 (UTC) Authors: Renaud Marlet, Daniel Le Métayer (Trusted Logic) Classification: Public Number:
More informationDesign and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet
Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet Hao Zhao, Sead Muftic School of Information and Communication Technologies (ICT) Royal Institute of Technology
More informationNuVision One-Card Configuration
NuVision One-Card Configuration Version 4.0 Updated: June 2012 GoPrint Systems, Inc. 2012 GoPrint Systems, Inc. All rights reserved. One Annabel Lane, Suite 105 San Ramon, CA 94583 (925)790-0070 Fax: (925)790-0071
More informationJava Card Technology-based Corporate Card Solutions
Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives
More informationWhat s NetBeans? Like Eclipse:
What s NetBeans? Like Eclipse: It is a free software / open source platform-independent software framework for delivering what the project calls "richclient applications" It is an Integrated Development
More informationSecurity-by-Contract for Applications Evolution in Multi-Application Smart Cards
Security-by-Contract for Applications Evolution in Multi-Application Smart Cards Nicola Dragoni ndra@imm.dtu.dk http://www2.imm.dtu.dk/~ndra Embedded Systems Engineering (ESE) Section DTU Informatics Technical
More informationSaperion. Release Notes. Version: 8.0
Saperion Release Notes Version: 8.0 Written by: Product Knowledge, R&D Date: July 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International Inc., registered in the U.S. and/or
More informationLdap Port Error Code 34 - Incorrect Dn Given
Ldap Port Error Code 34 - Incorrect Dn Given InvalidNameException: colors: (LDAP: error code 34-0000208F: NameErr: DSID-031001BA, problem Error Code. Description. 8350, DN format is incorrect. Port Number:
More informationOracle Adaptive Access Manager. 1 Oracle Adaptive Access Manager Documentation. 2 Resolved Issues. Release Notes Release 10g (
Oracle Adaptive Access Manager Release Notes Release 10g (10.1.4.5) E13648-03 May 2009 These release notes contain important last minute information not included in the Oracle Adaptive Access Manager Release
More informationWeb as a Distributed System
Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,
More informationThe Chrome or Firefox browsers are alternatives to Internet Explorer 11.
The Chrome or Firefox browsers are alternatives to Internet Explorer 11. Firefox 51 will require additional configuration steps as it begins to drop support for NPAPI plugins. - Following the link below
More informationName of subject: JAVA PROGRAMMING Subject code: Semester: V ASSIGNMENT 1
Name of subject: JAVA PROGRAMMING Subject code: 17515 Semester: V ASSIGNMENT 1 3 Marks Introduction to Java (16 Marks) 1. Write all primitive data types available in java with their storage size in bytes.
More informationAbout MagTek. PIN Entry & Management
About MagTek Since 1972, MagTek has been a leading manufacturer of electronic devices and systems for the reliable issuance, reading, transmission and security of cards, checks, PINs and other identification
More informationObject Oriented Programming and Design in Java. Session 2 Instructor: Bert Huang
Object Oriented Programming and Design in Java Session 2 Instructor: Bert Huang Announcements TA: Yipeng Huang, yh2315, Mon 4-6 OH on MICE clarification Next Monday's class canceled for Distinguished Lecture:
More informationOracle SOA Dynamic Service Call Framework By Kathiravan Udayakumar
http://oraclearchworld.wordpress.com/ Oracle SOA Dynamic Service Call Framework By Kathiravan Udayakumar Dynamic Service call Framework is very critical and immediate requirement of most of SOA Programs
More informationACOS 3 Contact Card. Functional Specification. Subject to change without prior notice
ACOS 3 Contact Card Functional Specification Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Features...3 1.2. Technical Specifications...3 1.2.1. Electrical...3 1.2.2.
More informationCAS 703 Software Design
Dr. Ridha Khedri Department of Computing and Software, McMaster University Canada L8S 4L7, Hamilton, Ontario Acknowledgments: Material based on Software Architecture by Tao et al. (Chapters 6 and 7) 1
More informationOCA Java SE 7 Programmer I Certification Guide By Mela Gupta. Arrays
1 OCA Java SE 7 Programmer I Certification Guide By Mela Gupta In the OCA Java SE 7 programmer exam, you ll be asked many questions on how to create, modify, and delete String, StringBuilder, arrays, and
More informationIntroduction to Java. Lecture 1 COP 3252 Summer May 16, 2017
Introduction to Java Lecture 1 COP 3252 Summer 2017 May 16, 2017 The Java Language Java is a programming language that evolved from C++ Both are object-oriented They both have much of the same syntax Began
More informationGetting Started with Web Services
Getting Started with Web Services Getting Started with Web Services A web service is a set of functions packaged into a single entity that is available to other systems on a network. The network can be
More informationCSE P 501 Compilers. Java Implementation JVMs, JITs &c Hal Perkins Winter /11/ Hal Perkins & UW CSE V-1
CSE P 501 Compilers Java Implementation JVMs, JITs &c Hal Perkins Winter 2008 3/11/2008 2002-08 Hal Perkins & UW CSE V-1 Agenda Java virtual machine architecture.class files Class loading Execution engines
More informationComputational Applications in Nuclear Astrophysics using Java Java course Lecture 1
Computational Applications in Nuclear Astrophysics using Java Java course Lecture 1 Prepared for course 160410/411 Michael C. Kunkel m.kunkel@fz-juelich.de Materials taken from; docs.oracle.com Teach Yourself
More informationGuide Installation and User Guide - Windows
Guide Installation and User Guide - Windows With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally
More informationesigntrust Qualified Certificate Installation
esigntrust Qualified Certificate Installation For Microsoft Windows System & Internet Explorer User Equipment Installation Guide Version. 2017-01 Copyright Correios e Telecomunicações de Macau, 2017 All
More informationFinancial Center Administration Console USER GUIDE
Financial Center Administration Console USER GUIDE For Client Use Only Effective April 2018 Table of contents Introduction 3 Communicating securely with Union Bank 3 Change Security Settings 4 Manage
More informationInstructions for Configuring Your Browser Settings and Online Security FAQ s
Instructions for Configuring Your Browser Settings and Online Security FAQ s General Settings The following browser settings and plug-ins are required to properly access Digital Insight s webbased solutions.
More informationCA Compiler Construction
CA4003 - Compiler Construction David Sinclair When procedure A calls procedure B, we name procedure A the caller and procedure B the callee. A Runtime Environment, also called an Activation Record, is
More informationMalware, , Database Security
Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)
More informationAnalysis of Security Models For Smart Cards
Analysis of Security Models For Smart Cards Ganesh J Pai gpai@virginia.edu ECE Department, University of Virginia Abstract Smart cards are an old breed of ubiquitous embedded-computing devices that are
More informationVendor: Oracle. Exam Code: 1Z Exam Name: Oracle Database 11g Security Essentials. Version: Demo
Vendor: Oracle Exam Code: 1Z0-528 Exam Name: Oracle Database 11g Security Essentials Version: Demo QUESTION 1 Which of the following tasks is the first task to perform when implementing Oracle Database
More informationLab5. Wooseok Kim
Lab5 Wooseok Kim wkim3@albany.edu www.cs.albany.edu/~wooseok/201 Question Answer Points 1 A or B 8 2 A 8 3 D 8 4 20 5 for class 10 for main 5 points for output 5 D or E 8 6 B 8 7 1 15 8 D 8 9 C 8 10 B
More informationIssues. Separation of. Distributed system security. Security services. Security policies. Security mechanism
Module 9 - Security Issues Separation of Security policies Precise definition of which entities in the system can take what actions Security mechanism Means of enforcing that policy Distributed system
More informationSecurity Policy for Schlumberger Cyberflex Access 32K Smart Card with ActivCard Applets
Security Policy for Schlumberger Cyberflex Access 32K Smart Card with ActivCard Applets TABLE OF CONTENTS 1 SCOPE OF DOCUMENT... 1 2 INTRODUCTION... 1 3 SECURITY LEVELS... 1 3.1 CRYPTOGRAPHIC MODULE SPECIFICATION...
More informationAn Oracle White Paper November Primavera Unifier Integration Overview: A Web Services Integration Approach
An Oracle White Paper November 2012 Primavera Unifier Integration Overview: A Web Services Integration Approach Introduction Oracle s Primavera Unifier offers an extensible interface platform based on
More informationGO-GLOBAL CONTENTS. Host Release Notes Version FOR WINDOWS
GO-GLOBAL FOR WINDOWS Host Release Notes Version 5.0.2.27327 (C) GRAPHON CORPORATION 1999-2019. ALL RIGHTS RESERVED. CONTENTS 1. Enhancements in 5.0.2.27327 2. Issues Fixed Since 5.0.2.26287 3. Known Issues
More informationCREDENTSYS CARD FAMILY
CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2
More informationIBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce
Software Announcement February 1, 2000 IBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce Overview Payment Gateway for AIX,
More informationPNF-101 NFC Reader Android Integration Guide Version 1.0
PNF-101 NFC Reader Android Integration Guide Version 1.0 10/19/2017 Revision History Revision Date Description By 1.0 2017/10/19 First version Clyde Wang i Table of Contents Revision History... i 1 Overview...
More informationPIC 20A Number, Autoboxing, and Unboxing
PIC 20A Number, Autoboxing, and Unboxing Ernest Ryu UCLA Mathematics Last edited: October 27, 2017 Illustrative example Consider the function that can take in any object. public static void printclassandobj
More informationDHS ID & CREDENTIALING INITIATIVE IPT MEETING
DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5
More informationEMC Documentum Composer
EMC Documentum Composer Version 6.5 SP2 User Guide P/N 300-009-462 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2008 2009 EMC Corporation. All
More informationA demonstration is available in which the OpenEapSmartcard.NET device is used as an authentication token, controlling the access to a Wi-Fi network.
1. Summary. T he goal of this project is to release a dotnet smartcard providing authentication services for network resources such as PPP, Wi-Fi and VPN (Virtual Private Network). The Extensible Authentication
More informationETSI TS V6.0.0 ( )
TS 102 226 V6.0.0 (2002-04) Technical Specification Smart cards; Remote APDU Structure for UICC based Applications (Release 6) 2 TS 102 226 V6.0.0 (2002-04) Reference DTS/SCP-000285 Keywords smart card,
More informationJava Card 3 Platform. Runtime Environment Specification, Classic Edition. Version May 2015
Java Card 3 Platform Runtime Environment Specification, Classic Edition Version 3.0.5 May 2015 Java Card 3 Platform Runtime Environment Specification, Classic Edition Version 3.0.5 Copyright 1998, 2015,
More information-Device. -Physical or virtual thing that does something -Software + hardware to operate a device (Controller runs port, Bus, device)
Devices -Host -CPU -Device -Controller device) +memory +OS -Physical or virtual thing that does something -Software + hardware to operate a device (Controller runs port, Bus, Communication -Registers -Control
More informationTestingofScout Application. Ludwigsburg,
TestingofScout Application Ludwigsburg, 27.10.2014 The Tools approach The Testing Theory approach Unit testing White box testing Black box testing Integration testing Functional testing System testing
More informationDisplaying SSL Configuration Information and Statistics
CHAPTER 7 Displaying SSL Configuration Information and Statistics This chapter describes the show commands available for displaying CSS SSL configuration information and statistics and an explanation of
More informationSpoofing iclass and iclass SE
Introduction The concept of emulating (spoofing) security access cards has become more and more difficult with the introduction of smart card technology. The older proximity based RFID access cards were
More informationCut, Paste, Drag-and-Drop
Cut, Paste, Drag-and-Drop Transferring Data Cut and paste via the clipboard and drag and drop allows for (relatively) easy data transfer within and between applications Expected behaviour of any application
More informationJrsys Mobile Banking Solutions
Jrsys Mobile Banking Solutions Jrsys International corp. James Wu Mobile PKI solutions 1.Mobile CA 2.Mobile RA 3.Mobile Signing and Validation Service CA Mobile Signature/ Encryption Mobile PKI Mobile
More informationCh 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated
Ch 9: Mobile Payments CNIT 128: Hacking Mobile Devices Updated 4-24-17 Current Generation Scenarios Mobile banking apps NFC-based or barcode-based payment apps used by consumers to purchase goods Premium-rated
More informationOpenCrypto. Unchaining the JavaCard Ecosystem https://boucycrypto.com
OpenCrypto Unchaining the JavaCard Ecosystem https://boucycrypto.com Who we are Vasilios Mavroudis Doctoral Researcher, UCL George Danezis Professor, UCL Petr Svenda Assistant Professor, MUNI Co-founder,
More informationCPS122 Lecture: From Python to Java last revised January 4, Objectives:
Objectives: CPS122 Lecture: From Python to Java last revised January 4, 2017 1. To introduce the notion of a compiled language 2. To introduce the notions of data type and a statically typed language 3.
More informationJava Internals. Frank Yellin Tim Lindholm JavaSoft
Java Internals Frank Yellin Tim Lindholm JavaSoft About This Talk The JavaSoft implementation of the Java Virtual Machine (JDK 1.0.2) Some companies have tweaked our implementation Alternative implementations
More informationSecure Elements 101. Sree Swaminathan Director Product Development, First Data
Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of
More informationThe Mondex Case Study: From Specifications to Code. H. Grandy, N. Moebius, M. Bischof, D. Haneberg, G. Schellhorn, K. Stenzel, W. Reif.
à ÊÇÅÍÆ ËÀǼ Universität Augsburg The Mondex Case Study: From Specifications to Code H. Grandy, N. Moebius, M. Bischof, D. Haneberg, G. Schellhorn, K. Stenzel, W. Reif Report 31 2006 Institut für Informatik
More informationIBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]
s@lm@n IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ] Question No : 1 What lists of key words tell you a prospect is looking to buy a SIEM or Log Manager Product?
More informationThe current topic: Python. Announcements. Python. Python
The current topic: Python Announcements! Introduction! reasons for studying languages! language classifications! simple syntax specification Object-oriented programming: Python Types and values Syntax
More informationJava Review Outline. basics exceptions variables arrays modulo operator if statements, booleans, comparisons loops: while and for
Java Review Outline basics exceptions variables arrays modulo operator if statements, booleans, comparisons loops: while and for Java basics write a simple program, e.g. hello world http://www2.hawaii.edu/~esb/2017fall.ics211/helloworl
More informationvsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationInteroperability Specification for ICCs and Personal Computer Systems
Interoperability Specification for ICCs and Personal Computer Systems Part 10 IFDs with Secure PIN Entry Capabilities Gemalto HID Global Identive NXP Semiconductors N.V. Oracle America Revision 2.02.08
More informationCEPTEST Server Version
CEPTEST Server Version The CEPTEST Server Version is designed for testing ep2 Servers with mass data and stress tests. It is intended to be used by acquirers and other server operators to simulate high
More informationUsing Eclipse for C Programming
Using Eclipse for C Programming George Ferguson ferguson@cs.rochester.edu June 2018 Abstract Students are used to using the Eclipse IDE for programming in Java. This document describes how to install and
More informationDMDC Card Technologies & Identification Systems Division. Evaluation of NIST SP End State Reference Implementation. Version 1.
DMDC Card Technologies & Identification Systems Division Evaluation of NIST SP 800-73 End State Reference Implementation Version 1.1 October 2005 i Revision History Page Issue Date Document Modification
More informationPPP Tunneling. Step by step explanation and configuration for creating PPP Tunnel
PPP Tunneling Step by step explanation and configuration for creating PPP Tunnel 1 Point-to-Point Protocol Point-to-Point Protocol (PPP) is used to establish a tunnel (direct connection) between two nodes.
More informationEnd user manual MARGARETA version 3.0 Revision Revision Date February 7, 2017
MARGARETA version 3.0 Revision 1 Revision Date February 7, 2017 MARGARETA card management system is a product of Noreg Ltd. Noreg Ltd. web: e-mail: Address: www.noreg.hu info@noreg.hu H-1118 Budapest,
More informationInstall and Issuing your first Full Feature Operator Card
Install and Issuing your first Full Feature Operator Card Install S-Series versasec.com 1(28) Table of Contents Install and Issuing your first Full Feature Operator Card... 3 Section 1: Install and Initial
More informationHardware Acceleration for Tagging
Parallel Hardware Parallel Applications IT industry (Silicon Valley) Parallel Software Users Hardware Acceleration for Tagging Sarah Bird, David McGrogan, John Kubiatowicz, Krste Asanovic June 5, 2008
More information