SMART CARDS APPLET DEVELOPMENT. Miguel Monteiro FEUP / DEI

Size: px
Start display at page:

Download "SMART CARDS APPLET DEVELOPMENT. Miguel Monteiro FEUP / DEI"

Transcription

1 SMART CARDS APPLET DEVELOPMENT Miguel Monteiro FEUP / DEI

2 JAVA SUPPORTED IDES Actual Java Card major version is now 3 (from 2009) It occurs in two flavors Java Card Classic (supported by the majority of card makers) Java Card Connected (scarcely available) Last update is version (from 2015) In this last version, Oracle changed the official IDE Until the IDE is Netbeans (that includes the runtime environment for Connected 3.0.2) In an Eclipse plugin is supplied and the runtime does not run in Netbeans anymore There are many others 3 rd party development tools From the main makers Gemalto, Oberthur, Morpho (Safran), (with a high price) jcardsim (free for Java Card 2.2) ( 2

3 NETBEANS Get the complete package from netbeans.org Select the Java Card 3 Connected package during installation 3

4 LATEST VERSION From the Oracle site for Java Card 4

5 ECLIPSE Install Eclipse and after that install the plugin From Help Install New Software (Add) Select the plugin archive (the.zip file) 5

6 APPLET INFO An Applet has a package and a class (from Applet) Both have a unique AID with the first 5 bytes common The project is created with a very simple applet skeleton. 6

7 THE SKELETON APPLET CODE create.script select.script 7

8 A HELLO APPLET Accepts a single command, and returns Hello Returns the sequence { 48 h, 65 h, 6c h, 6c h, 6f h } It responds only to the APDU (base 16): B

9 PROCESSING THE INCOMING APDU APDU bytes are in a Java Card allocated buffer OFFSET_CLA There is just one buffer for all applets Its size can be less than the transmitted bytes OFFSET_INS OFFSET_P1 OFFSET_CDATA OFFSET_P2 OFFSET_LC CDATA APDU Buffer Only the first 5 bytes are guaranteed to be in the buffer when process() is called. If for this APDU input data is expected, it is necessary to read them with short setincomingandreceive() (APDU method) It puts incoming bytes in the CDATA area of the buffer, but those bytes can be short of the total. The method returns the valid bytes transferred The total incoming bytes can be obtained with getincominglength() or reading the buffer at OFFSET_LC Further incoming bytes are transferred to the CDATA area with short receivebytes(short offset) that returns the number of bytes transferred to the position offset of the APDU buffer. 9

10 BUILDING THE OUTGOING APDU The same buffer is used for the response APDU Its size can be not enough for all the outgoing bytes In that case the response should be sent in chunks - A call to short setoutgoing() allows the use of the APDU buffer to store the response bytes and returns the expected number of outgoing bytes. - Next, the number of bytes to send should be indicated calling setoutgoinglength(short len) - After putting those bytes in some part of the APDU buffer, they are actually sent with a call to sendbytes(short offset, short len) - If the number of bytes doesn t fit in the buffer we can call sendbytes() multiple times. There Is also a convenience method for long responses using sendbyteslong( ) that manages automatically the APDU buffer. - After sending all the bytes the status bytes are also automatically sent. - All the above calls can be replaced by a single call to setoutgoingand Send(short offset, short len) if all the outgoing bytes fit into the APDU buffer. To send an error status, call the static method ISOException.throwIt(short code). Many error codes are already defined as constants in the ISO7816 static class. 10

11 A MORE ELABORATE EXAMPLE Purse protected with a 6 digit PIN Features Takes notes of small amounts of money Has a protection PIN with 3 tries Operations of credit and debit require the PIN There is a maximum amount in the purse ( ) There an operation to get the total, without the PIN The PIN is initialized at install Operations EnterPIN INS = 0x10 Credit INS = 0x20 Debit INS = 0x30 GetTotal INS = 0x40 11

12 12 DEMO Purse with Eclipse

13 SENSITIVE INFORMATION It is possible to intercept the communication between card and card reader For sensitive information that info can be encrypted using asymmetric keys Problem: card personalization, after applet is installed How Or Card can generate key pairs, but outputting just one of them Or a CSR with a public key Can have a command to store a key (or a certificate) These types of commands should be executed only once We can enforce it using a boolean to control the execution We can provide a temporary applet just for personalization After personalization using this second applet, it is deleted from the card (security domain owner) It can be reinstalled later for modifications (security domain owner) 13

14 COMMUNICATION BETWEEN APPLETS Applets in the same security domain can talk One of them will be the server and the other the client The server defines a Shareable java interface The Java Card framework defines the empty interface Shareable { } The server should derive an interface that extends it One object of the server Applet should implement it The client Applet can ask for this object calling the framework getappletshareableinterfaceobject( ) The server needs to override from the Applet class the method getshareableinterfaceobject( ) The server should verify the client identity Asymmetric keys Challenge - Response 14

15 COMMUNICATION SCHEME Java Card Runtime Environment getappletshareabeinterfaceobject() AID Client Applet return the SIO invoke a method return from method firewall return the SIO AID SIO Shareable interface and SIO getshareableinterfaceobject() Server Applet 15

16 AUTHENTICATION SCHEME Client implements AuthInterface challenge(byte[] buffer) Server implements ServiceShareableInterface someop(authinterface client, byte[] buffer, ) aid = lookupaid(buffer, 0, len); sio = getappletshareableinterfaceobject(aid, par); sio.someop(this, buffer, ); public void challenge(byte[] buffer) { respondtochallenge(buffer); } overrides getshareableinterfaceobject(aid client, par) public void someop(authinterface client, byte[] buffer, ) { generatechallenge(buffer); client.challenge(buffer); if (!checkresponse(buffer)) ISOException.throwIt(SW_UNAUTHORIZED_CLIENT); } Shareable Interface Objects can communicate only using primitive values static fields that do not contain references to objects global arrays - the APDU buffer is a global array (it is cleaned when process() returns) 16

17 INITIALIZATION THROUGH 2 ND APPLET We can use the following schema After performing the initialization Applet B is removed from the card The initialization involved creating a key pair in the card Getting the public key Putting it into a CSR and getting a certificate from a CA Putting the user certificate (signed by the CA) in the card 17

Java Card 2.0 Application Programming Interfaces

Java Card 2.0 Application Programming Interfaces Java Card 20 Application Programming Interfaces October 13, 1997 Revision 10 Final 1997 Sun Microsystems, Inc 1997 Sun Microsystems, Inc 901 San Antonio Road, Palo Alto, California 94303-4900 USA This

More information

SMART CARDS. Miguel Monteiro FEUP / DEI

SMART CARDS. Miguel Monteiro FEUP / DEI SMART CARDS Miguel Monteiro apm@fe.up.pt FEUP / DEI WHAT IS A SMART CARD Distinguishable characteristics Can participate in automated electronic transactions Used primarily to add security Not easily forged

More information

MTAT Applied Cryptography

MTAT Applied Cryptography MTAT.07.017 Applied Cryptography Smart Cards (JavaCard) University of Tartu Spring 2018 1 / 22 Smart Card Security Model Parties involved in a smart card based system: Cardholder Data owner Terminal owner

More information

DRAFT. class javacardx.framework.linearfixedfile. class javacardx.framework.cyclicfile class javacardx.framework.transparentfile

DRAFT. class javacardx.framework.linearfixedfile. class javacardx.framework.cyclicfile class javacardx.framework.transparentfile Java Card 20 API, copyright Sun Microsystems Inc API User s Guide Class Hierarchy Index Java Card 20 API Other Packages package javacardframework package javacardxcrypto package javacardxframework - 1

More information

MTAT Applied Cryptography

MTAT Applied Cryptography MTAT.07.017 Applied Cryptography Smart Cards (JavaCard) University of Tartu Spring 2017 1 / 23 Security Model Parties involved in smart card based system: Cardholder Data owner Terminal Card issuer Card

More information

A Type System for Checking Applet Isolation in Java Card

A Type System for Checking Applet Isolation in Java Card A Type System for Checking Applet Isolation in Java Card Peter Müller ETH Zürich Joint work with Werner Dietl and Arnd Poetzsch-Heffter Applet Isolation 2 Applet Context 1 Firewall Applet Context 2 SIO

More information

Secure Object Sharing in Java Card

Secure Object Sharing in Java Card Secure Object Sharing in Java Card Michael Montgomery Austin Product Center Schlumberger Austin, TX 78726 mmontgomery@slb.com Ksheerabdhi Krishna Austin Product Center Schlumberger Austin, TX 78726 kkrishna@slb.com

More information

Java Card 3 Platform. Peter Allenbach Sun Microsystems, Inc.

Java Card 3 Platform. Peter Allenbach Sun Microsystems, Inc. Java Card 3 Platform Peter Allenbach Sun Microsystems, Inc. Agenda From plastic to Java Card 3.0 Things to know about Java Card 3.0 Introducing Java Card 3.0 Java Card 3.0 vs. Java SE Java Card 3.0 vs.

More information

basic schemes, memory types: transient vs. persistent, garbage collection basic schemes, system-level vs. user-level transactions

basic schemes, memory types: transient vs. persistent, garbage collection basic schemes, system-level vs. user-level transactions Overview A. Basic machinery execution model, byte code vs. native code, language aspects B. Memory management basic schemes, memory types: transient vs. persistent, garbage collection C. Atomicity and

More information

Fujitsu mpollux DigiSign Client Technical References

Fujitsu mpollux DigiSign Client Technical References Fujitsu mpollux DigiSign Client Technical References This reference document contains technical information necessary for system administrators, who are installing Fujitsu mpollux DigiSign Client in their

More information

Java Card 2.0 Programming Concepts. October 15, 1997 Revision 1.0 Final 1997 Sun Microsystems, Inc.

Java Card 2.0 Programming Concepts. October 15, 1997 Revision 1.0 Final 1997 Sun Microsystems, Inc. Java Card 2.0 Programming Concepts Revision 1.0 Final 1997 Sun Microsystems, Inc. 1997 Sun Microsystems, Inc. 901 San Antonio Road, Palo Alto, California 94303-4900 U.S.A. This document is protected by

More information

vsec:cms S-Series Introduction Release Notes Release October 16 th, 2018

vsec:cms S-Series Introduction Release Notes Release October 16 th, 2018 vsec:cms S-Series Release Notes Release 5.3.0.0 October 16 th, 2018 Introduction This document provides information about the vsec:cms S-Series product suite release. The information provided in this document

More information

APDU-Test Card Functional Requirements

APDU-Test Card Functional Requirements Autor Andreas Schwier Version V1.1 Datum 03. January 2012 Copyright 2012 CardContact Software & System Consulting The authors of this documentation make no representation or warranty regarding whether

More information

IDGo Middleware and SDK for Mobile Devices

IDGo Middleware and SDK for Mobile Devices Smartjac Industries Inc. - Kanalvägen 1A 2nd floor SE-194 61 Upplands Väsby Sweden www.smartjac.com / www.smartjac.biz Phone: +46(8)41071230 - Email: order@smartjac.com IDGo 800 - Middleware and SDK for

More information

SIM Smart Card Overview

SIM Smart Card Overview SIM Smart Card Overview Smart Card Introduction 2 Java Card Java Card Based SIM Development Environment Service Examples 3 Smart Cards? A smart card is a plastic card that contains an embedded integrated

More information

USB Key as an active device of Security System

USB Key as an active device of Security System IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011 161 USB Key as an active device of Security System Mohammed Nasir Uddin 1, Selina Sharmin 2, Abu Hasnat

More information

Security-by-Contract for Open Multi-Application Smart Cards

Security-by-Contract for Open Multi-Application Smart Cards Security-by-Contract for Open Multi-Application Smart Cards O.Gadyatskaya, F. Massacci (University of Trento) B. Chetali, Q.-H. Nguyen (Trusted Labs, Gemalto) e-smart 2011 September 21-23, Sophia-Antipolis

More information

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart

More information

Guide Installation and User Guide - Mac

Guide Installation and User Guide - Mac Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

vsec:cms S-Series Introduction Release Notes Release April 27 th, 2018

vsec:cms S-Series Introduction Release Notes Release April 27 th, 2018 vsec:cms S-Series Release Notes Release 5.1.0.0 April 27 th, 2018 Introduction This document provides information about the vsec:cms S-Series product suite release. The information provided in this document

More information

CMSC131. Library Classes

CMSC131. Library Classes CMSC131 Designing Classes Library Classes Due to Java being 100% object-oriented, all code must live inside a class but there is some functionality/information that might be best kept in a more central

More information

Card Specification Amendment A March 2004

Card Specification Amendment A March 2004 Card Specification 2.1.1 March 2004 Use of this information is governed by the GlobalPlatform license agreement and any use inconsistent with that agreement is strictly prohibited. 2 GlobalPlatform Card

More information

CHAPTER 7 OBJECTS AND CLASSES

CHAPTER 7 OBJECTS AND CLASSES CHAPTER 7 OBJECTS AND CLASSES OBJECTIVES After completing Objects and Classes, you will be able to: Explain the use of classes in Java for representing structured data. Distinguish between objects and

More information

Security Implications of Memory Use on Java Card Platform

Security Implications of Memory Use on Java Card Platform Masaryk University Faculty of Informatics Security Implications of Memory Use on Java Card Platform Master s Thesis Ashwin Arvind Yakkundi Chennai, December 2017 Masaryk University Faculty of Informatics

More information

CHAPTER 7 OBJECTS AND CLASSES

CHAPTER 7 OBJECTS AND CLASSES CHAPTER 7 OBJECTS AND CLASSES OBJECTIVES After completing Objects and Classes, you will be able to: Explain the use of classes in Java for representing structured data. Distinguish between objects and

More information

Java Card Technology Overview

Java Card Technology Overview CHAPTER3 Java Card Technology Overview Java Card technology enables programs written in the Java programming language to run on smart cards and other resource-constrained devices. This chapter gives an

More information

Chapter 1 Introduction to Computers, Programs, and Java

Chapter 1 Introduction to Computers, Programs, and Java Chapter 1 Introduction to Computers, Programs, and Java 1.1 What are hardware and software? 1. A computer is an electronic device that stores and processes data. A computer includes both hardware and software.

More information

13 th Windsor Regional Secondary School Computer Programming Competition

13 th Windsor Regional Secondary School Computer Programming Competition SCHOOL OF COMPUTER SCIENCE 13 th Windsor Regional Secondary School Computer Programming Competition Hosted by The School of Computer Science, University of Windsor WORKSHOP I [ Overview of the Java/Eclipse

More information

FINEID - S1 v2.1 Electronic ID Application

FINEID - S1 v2.1 Electronic ID Application FINEID SPECIFICATION 5.12.2011 FINEID - S1 v2.1 Electronic ID Application Application Note 1 Population Register Centre (VRK) Certification Authority Services P.O. Box 70 FIN-00581 Helsinki Finland http://www.fineid.fi

More information

Technical Bulletin: CAC Data Model Change in 144K Dual Interface Cards

Technical Bulletin: CAC Data Model Change in 144K Dual Interface Cards DEPARTMENT OF DEFENSE HUMAN RESOURCES ACTIVITY DEFENSE MANPOWER DATA CENTER DoD CENTER MONTEREY BAY 400 GIGLING ROAD SEASIDE, CALIFORNIA 93955-6771 To: DoD CAC Application and Testing Community From: Defense

More information

Smartcards. ISO 7816 & smartcard operating systems. Erik Poll Digital Security Radboud University Nijmegen

Smartcards. ISO 7816 & smartcard operating systems. Erik Poll Digital Security Radboud University Nijmegen Smartcards ISO 7816 & smartcard operating systems Erik Poll Digital Security Radboud University Nijmegen 1 Standard for contact smartcards ISO7816 7816-1 Physical characteristics 7816-2 Dimension & size

More information

T Smart Card Application Development. Spring 2003 Lecture 3: Applet development basics

T Smart Card Application Development. Spring 2003 Lecture 3: Applet development basics T-110.497 Smart Card Application Development Spring 2003 Lecture 3: Applet development basics Development process Java files Java compiler Class files Java Card simulator Export files Java Card converter

More information

Security Properties and Java Card Specificities To Be Studied in the SecSafe Project

Security Properties and Java Card Specificities To Be Studied in the SecSafe Project Security Properties and Java Card Specificities To Be Studied in the SecSafe Project Date: 2001/08/23 08:40:24 (UTC) Authors: Renaud Marlet, Daniel Le Métayer (Trusted Logic) Classification: Public Number:

More information

Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet

Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet Hao Zhao, Sead Muftic School of Information and Communication Technologies (ICT) Royal Institute of Technology

More information

NuVision One-Card Configuration

NuVision One-Card Configuration NuVision One-Card Configuration Version 4.0 Updated: June 2012 GoPrint Systems, Inc. 2012 GoPrint Systems, Inc. All rights reserved. One Annabel Lane, Suite 105 San Ramon, CA 94583 (925)790-0070 Fax: (925)790-0071

More information

Java Card Technology-based Corporate Card Solutions

Java Card Technology-based Corporate Card Solutions Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives

More information

What s NetBeans? Like Eclipse:

What s NetBeans? Like Eclipse: What s NetBeans? Like Eclipse: It is a free software / open source platform-independent software framework for delivering what the project calls "richclient applications" It is an Integrated Development

More information

Security-by-Contract for Applications Evolution in Multi-Application Smart Cards

Security-by-Contract for Applications Evolution in Multi-Application Smart Cards Security-by-Contract for Applications Evolution in Multi-Application Smart Cards Nicola Dragoni ndra@imm.dtu.dk http://www2.imm.dtu.dk/~ndra Embedded Systems Engineering (ESE) Section DTU Informatics Technical

More information

Saperion. Release Notes. Version: 8.0

Saperion. Release Notes. Version: 8.0 Saperion Release Notes Version: 8.0 Written by: Product Knowledge, R&D Date: July 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International Inc., registered in the U.S. and/or

More information

Ldap Port Error Code 34 - Incorrect Dn Given

Ldap Port Error Code 34 - Incorrect Dn Given Ldap Port Error Code 34 - Incorrect Dn Given InvalidNameException: colors: (LDAP: error code 34-0000208F: NameErr: DSID-031001BA, problem Error Code. Description. 8350, DN format is incorrect. Port Number:

More information

Oracle Adaptive Access Manager. 1 Oracle Adaptive Access Manager Documentation. 2 Resolved Issues. Release Notes Release 10g (

Oracle Adaptive Access Manager. 1 Oracle Adaptive Access Manager Documentation. 2 Resolved Issues. Release Notes Release 10g ( Oracle Adaptive Access Manager Release Notes Release 10g (10.1.4.5) E13648-03 May 2009 These release notes contain important last minute information not included in the Oracle Adaptive Access Manager Release

More information

Web as a Distributed System

Web as a Distributed System Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,

More information

The Chrome or Firefox browsers are alternatives to Internet Explorer 11.

The Chrome or Firefox browsers are alternatives to Internet Explorer 11. The Chrome or Firefox browsers are alternatives to Internet Explorer 11. Firefox 51 will require additional configuration steps as it begins to drop support for NPAPI plugins. - Following the link below

More information

Name of subject: JAVA PROGRAMMING Subject code: Semester: V ASSIGNMENT 1

Name of subject: JAVA PROGRAMMING Subject code: Semester: V ASSIGNMENT 1 Name of subject: JAVA PROGRAMMING Subject code: 17515 Semester: V ASSIGNMENT 1 3 Marks Introduction to Java (16 Marks) 1. Write all primitive data types available in java with their storage size in bytes.

More information

About MagTek. PIN Entry & Management

About MagTek. PIN Entry & Management About MagTek Since 1972, MagTek has been a leading manufacturer of electronic devices and systems for the reliable issuance, reading, transmission and security of cards, checks, PINs and other identification

More information

Object Oriented Programming and Design in Java. Session 2 Instructor: Bert Huang

Object Oriented Programming and Design in Java. Session 2 Instructor: Bert Huang Object Oriented Programming and Design in Java Session 2 Instructor: Bert Huang Announcements TA: Yipeng Huang, yh2315, Mon 4-6 OH on MICE clarification Next Monday's class canceled for Distinguished Lecture:

More information

Oracle SOA Dynamic Service Call Framework By Kathiravan Udayakumar

Oracle SOA Dynamic Service Call Framework By Kathiravan Udayakumar http://oraclearchworld.wordpress.com/ Oracle SOA Dynamic Service Call Framework By Kathiravan Udayakumar Dynamic Service call Framework is very critical and immediate requirement of most of SOA Programs

More information

ACOS 3 Contact Card. Functional Specification. Subject to change without prior notice

ACOS 3 Contact Card. Functional Specification.   Subject to change without prior notice ACOS 3 Contact Card Functional Specification Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Features...3 1.2. Technical Specifications...3 1.2.1. Electrical...3 1.2.2.

More information

CAS 703 Software Design

CAS 703 Software Design Dr. Ridha Khedri Department of Computing and Software, McMaster University Canada L8S 4L7, Hamilton, Ontario Acknowledgments: Material based on Software Architecture by Tao et al. (Chapters 6 and 7) 1

More information

OCA Java SE 7 Programmer I Certification Guide By Mela Gupta. Arrays

OCA Java SE 7 Programmer I Certification Guide By Mela Gupta. Arrays 1 OCA Java SE 7 Programmer I Certification Guide By Mela Gupta In the OCA Java SE 7 programmer exam, you ll be asked many questions on how to create, modify, and delete String, StringBuilder, arrays, and

More information

Introduction to Java. Lecture 1 COP 3252 Summer May 16, 2017

Introduction to Java. Lecture 1 COP 3252 Summer May 16, 2017 Introduction to Java Lecture 1 COP 3252 Summer 2017 May 16, 2017 The Java Language Java is a programming language that evolved from C++ Both are object-oriented They both have much of the same syntax Began

More information

Getting Started with Web Services

Getting Started with Web Services Getting Started with Web Services Getting Started with Web Services A web service is a set of functions packaged into a single entity that is available to other systems on a network. The network can be

More information

CSE P 501 Compilers. Java Implementation JVMs, JITs &c Hal Perkins Winter /11/ Hal Perkins & UW CSE V-1

CSE P 501 Compilers. Java Implementation JVMs, JITs &c Hal Perkins Winter /11/ Hal Perkins & UW CSE V-1 CSE P 501 Compilers Java Implementation JVMs, JITs &c Hal Perkins Winter 2008 3/11/2008 2002-08 Hal Perkins & UW CSE V-1 Agenda Java virtual machine architecture.class files Class loading Execution engines

More information

Computational Applications in Nuclear Astrophysics using Java Java course Lecture 1

Computational Applications in Nuclear Astrophysics using Java Java course Lecture 1 Computational Applications in Nuclear Astrophysics using Java Java course Lecture 1 Prepared for course 160410/411 Michael C. Kunkel m.kunkel@fz-juelich.de Materials taken from; docs.oracle.com Teach Yourself

More information

Guide Installation and User Guide - Windows

Guide Installation and User Guide - Windows Guide Installation and User Guide - Windows With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally

More information

esigntrust Qualified Certificate Installation

esigntrust Qualified Certificate Installation esigntrust Qualified Certificate Installation For Microsoft Windows System & Internet Explorer User Equipment Installation Guide Version. 2017-01 Copyright Correios e Telecomunicações de Macau, 2017 All

More information

Financial Center Administration Console USER GUIDE

Financial Center Administration Console USER GUIDE Financial Center Administration Console USER GUIDE For Client Use Only Effective April 2018 Table of contents Introduction 3 Communicating securely with Union Bank 3 Change Security Settings 4 Manage

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s

Instructions for Configuring Your Browser Settings and Online Security FAQ s Instructions for Configuring Your Browser Settings and Online Security FAQ s General Settings The following browser settings and plug-ins are required to properly access Digital Insight s webbased solutions.

More information

CA Compiler Construction

CA Compiler Construction CA4003 - Compiler Construction David Sinclair When procedure A calls procedure B, we name procedure A the caller and procedure B the callee. A Runtime Environment, also called an Activation Record, is

More information

Malware, , Database Security

Malware,  , Database Security Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)

More information

Analysis of Security Models For Smart Cards

Analysis of Security Models For Smart Cards Analysis of Security Models For Smart Cards Ganesh J Pai gpai@virginia.edu ECE Department, University of Virginia Abstract Smart cards are an old breed of ubiquitous embedded-computing devices that are

More information

Vendor: Oracle. Exam Code: 1Z Exam Name: Oracle Database 11g Security Essentials. Version: Demo

Vendor: Oracle. Exam Code: 1Z Exam Name: Oracle Database 11g Security Essentials. Version: Demo Vendor: Oracle Exam Code: 1Z0-528 Exam Name: Oracle Database 11g Security Essentials Version: Demo QUESTION 1 Which of the following tasks is the first task to perform when implementing Oracle Database

More information

Lab5. Wooseok Kim

Lab5. Wooseok Kim Lab5 Wooseok Kim wkim3@albany.edu www.cs.albany.edu/~wooseok/201 Question Answer Points 1 A or B 8 2 A 8 3 D 8 4 20 5 for class 10 for main 5 points for output 5 D or E 8 6 B 8 7 1 15 8 D 8 9 C 8 10 B

More information

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism Module 9 - Security Issues Separation of Security policies Precise definition of which entities in the system can take what actions Security mechanism Means of enforcing that policy Distributed system

More information

Security Policy for Schlumberger Cyberflex Access 32K Smart Card with ActivCard Applets

Security Policy for Schlumberger Cyberflex Access 32K Smart Card with ActivCard Applets Security Policy for Schlumberger Cyberflex Access 32K Smart Card with ActivCard Applets TABLE OF CONTENTS 1 SCOPE OF DOCUMENT... 1 2 INTRODUCTION... 1 3 SECURITY LEVELS... 1 3.1 CRYPTOGRAPHIC MODULE SPECIFICATION...

More information

An Oracle White Paper November Primavera Unifier Integration Overview: A Web Services Integration Approach

An Oracle White Paper November Primavera Unifier Integration Overview: A Web Services Integration Approach An Oracle White Paper November 2012 Primavera Unifier Integration Overview: A Web Services Integration Approach Introduction Oracle s Primavera Unifier offers an extensible interface platform based on

More information

GO-GLOBAL CONTENTS. Host Release Notes Version FOR WINDOWS

GO-GLOBAL CONTENTS. Host Release Notes Version FOR WINDOWS GO-GLOBAL FOR WINDOWS Host Release Notes Version 5.0.2.27327 (C) GRAPHON CORPORATION 1999-2019. ALL RIGHTS RESERVED. CONTENTS 1. Enhancements in 5.0.2.27327 2. Issues Fixed Since 5.0.2.26287 3. Known Issues

More information

CREDENTSYS CARD FAMILY

CREDENTSYS CARD FAMILY CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2

More information

IBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce

IBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce Software Announcement February 1, 2000 IBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce Overview Payment Gateway for AIX,

More information

PNF-101 NFC Reader Android Integration Guide Version 1.0

PNF-101 NFC Reader Android Integration Guide Version 1.0 PNF-101 NFC Reader Android Integration Guide Version 1.0 10/19/2017 Revision History Revision Date Description By 1.0 2017/10/19 First version Clyde Wang i Table of Contents Revision History... i 1 Overview...

More information

PIC 20A Number, Autoboxing, and Unboxing

PIC 20A Number, Autoboxing, and Unboxing PIC 20A Number, Autoboxing, and Unboxing Ernest Ryu UCLA Mathematics Last edited: October 27, 2017 Illustrative example Consider the function that can take in any object. public static void printclassandobj

More information

DHS ID & CREDENTIALING INITIATIVE IPT MEETING

DHS ID & CREDENTIALING INITIATIVE IPT MEETING DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5

More information

EMC Documentum Composer

EMC Documentum Composer EMC Documentum Composer Version 6.5 SP2 User Guide P/N 300-009-462 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2008 2009 EMC Corporation. All

More information

A demonstration is available in which the OpenEapSmartcard.NET device is used as an authentication token, controlling the access to a Wi-Fi network.

A demonstration is available in which the OpenEapSmartcard.NET device is used as an authentication token, controlling the access to a Wi-Fi network. 1. Summary. T he goal of this project is to release a dotnet smartcard providing authentication services for network resources such as PPP, Wi-Fi and VPN (Virtual Private Network). The Extensible Authentication

More information

ETSI TS V6.0.0 ( )

ETSI TS V6.0.0 ( ) TS 102 226 V6.0.0 (2002-04) Technical Specification Smart cards; Remote APDU Structure for UICC based Applications (Release 6) 2 TS 102 226 V6.0.0 (2002-04) Reference DTS/SCP-000285 Keywords smart card,

More information

Java Card 3 Platform. Runtime Environment Specification, Classic Edition. Version May 2015

Java Card 3 Platform. Runtime Environment Specification, Classic Edition. Version May 2015 Java Card 3 Platform Runtime Environment Specification, Classic Edition Version 3.0.5 May 2015 Java Card 3 Platform Runtime Environment Specification, Classic Edition Version 3.0.5 Copyright 1998, 2015,

More information

-Device. -Physical or virtual thing that does something -Software + hardware to operate a device (Controller runs port, Bus, device)

-Device. -Physical or virtual thing that does something -Software + hardware to operate a device (Controller runs port, Bus, device) Devices -Host -CPU -Device -Controller device) +memory +OS -Physical or virtual thing that does something -Software + hardware to operate a device (Controller runs port, Bus, Communication -Registers -Control

More information

TestingofScout Application. Ludwigsburg,

TestingofScout Application. Ludwigsburg, TestingofScout Application Ludwigsburg, 27.10.2014 The Tools approach The Testing Theory approach Unit testing White box testing Black box testing Integration testing Functional testing System testing

More information

Displaying SSL Configuration Information and Statistics

Displaying SSL Configuration Information and Statistics CHAPTER 7 Displaying SSL Configuration Information and Statistics This chapter describes the show commands available for displaying CSS SSL configuration information and statistics and an explanation of

More information

Spoofing iclass and iclass SE

Spoofing iclass and iclass SE Introduction The concept of emulating (spoofing) security access cards has become more and more difficult with the introduction of smart card technology. The older proximity based RFID access cards were

More information

Cut, Paste, Drag-and-Drop

Cut, Paste, Drag-and-Drop Cut, Paste, Drag-and-Drop Transferring Data Cut and paste via the clipboard and drag and drop allows for (relatively) easy data transfer within and between applications Expected behaviour of any application

More information

Jrsys Mobile Banking Solutions

Jrsys Mobile Banking Solutions Jrsys Mobile Banking Solutions Jrsys International corp. James Wu Mobile PKI solutions 1.Mobile CA 2.Mobile RA 3.Mobile Signing and Validation Service CA Mobile Signature/ Encryption Mobile PKI Mobile

More information

Ch 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated

Ch 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated Ch 9: Mobile Payments CNIT 128: Hacking Mobile Devices Updated 4-24-17 Current Generation Scenarios Mobile banking apps NFC-based or barcode-based payment apps used by consumers to purchase goods Premium-rated

More information

OpenCrypto. Unchaining the JavaCard Ecosystem https://boucycrypto.com

OpenCrypto. Unchaining the JavaCard Ecosystem https://boucycrypto.com OpenCrypto Unchaining the JavaCard Ecosystem https://boucycrypto.com Who we are Vasilios Mavroudis Doctoral Researcher, UCL George Danezis Professor, UCL Petr Svenda Assistant Professor, MUNI Co-founder,

More information

CPS122 Lecture: From Python to Java last revised January 4, Objectives:

CPS122 Lecture: From Python to Java last revised January 4, Objectives: Objectives: CPS122 Lecture: From Python to Java last revised January 4, 2017 1. To introduce the notion of a compiled language 2. To introduce the notions of data type and a statically typed language 3.

More information

Java Internals. Frank Yellin Tim Lindholm JavaSoft

Java Internals. Frank Yellin Tim Lindholm JavaSoft Java Internals Frank Yellin Tim Lindholm JavaSoft About This Talk The JavaSoft implementation of the Java Virtual Machine (JDK 1.0.2) Some companies have tweaked our implementation Alternative implementations

More information

Secure Elements 101. Sree Swaminathan Director Product Development, First Data

Secure Elements 101. Sree Swaminathan Director Product Development, First Data Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of

More information

The Mondex Case Study: From Specifications to Code. H. Grandy, N. Moebius, M. Bischof, D. Haneberg, G. Schellhorn, K. Stenzel, W. Reif.

The Mondex Case Study: From Specifications to Code. H. Grandy, N. Moebius, M. Bischof, D. Haneberg, G. Schellhorn, K. Stenzel, W. Reif. à ÊÇÅÍÆ ËÀǼ Universität Augsburg The Mondex Case Study: From Specifications to Code H. Grandy, N. Moebius, M. Bischof, D. Haneberg, G. Schellhorn, K. Stenzel, W. Reif Report 31 2006 Institut für Informatik

More information

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ] s@lm@n IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ] Question No : 1 What lists of key words tell you a prospect is looking to buy a SIEM or Log Manager Product?

More information

The current topic: Python. Announcements. Python. Python

The current topic: Python. Announcements. Python. Python The current topic: Python Announcements! Introduction! reasons for studying languages! language classifications! simple syntax specification Object-oriented programming: Python Types and values Syntax

More information

Java Review Outline. basics exceptions variables arrays modulo operator if statements, booleans, comparisons loops: while and for

Java Review Outline. basics exceptions variables arrays modulo operator if statements, booleans, comparisons loops: while and for Java Review Outline basics exceptions variables arrays modulo operator if statements, booleans, comparisons loops: while and for Java basics write a simple program, e.g. hello world http://www2.hawaii.edu/~esb/2017fall.ics211/helloworl

More information

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Interoperability Specification for ICCs and Personal Computer Systems

Interoperability Specification for ICCs and Personal Computer Systems Interoperability Specification for ICCs and Personal Computer Systems Part 10 IFDs with Secure PIN Entry Capabilities Gemalto HID Global Identive NXP Semiconductors N.V. Oracle America Revision 2.02.08

More information

CEPTEST Server Version

CEPTEST Server Version CEPTEST Server Version The CEPTEST Server Version is designed for testing ep2 Servers with mass data and stress tests. It is intended to be used by acquirers and other server operators to simulate high

More information

Using Eclipse for C Programming

Using Eclipse for C Programming Using Eclipse for C Programming George Ferguson ferguson@cs.rochester.edu June 2018 Abstract Students are used to using the Eclipse IDE for programming in Java. This document describes how to install and

More information

DMDC Card Technologies & Identification Systems Division. Evaluation of NIST SP End State Reference Implementation. Version 1.

DMDC Card Technologies & Identification Systems Division. Evaluation of NIST SP End State Reference Implementation. Version 1. DMDC Card Technologies & Identification Systems Division Evaluation of NIST SP 800-73 End State Reference Implementation Version 1.1 October 2005 i Revision History Page Issue Date Document Modification

More information

PPP Tunneling. Step by step explanation and configuration for creating PPP Tunnel

PPP Tunneling. Step by step explanation and configuration for creating PPP Tunnel PPP Tunneling Step by step explanation and configuration for creating PPP Tunnel 1 Point-to-Point Protocol Point-to-Point Protocol (PPP) is used to establish a tunnel (direct connection) between two nodes.

More information

End user manual MARGARETA version 3.0 Revision Revision Date February 7, 2017

End user manual MARGARETA version 3.0 Revision Revision Date February 7, 2017 MARGARETA version 3.0 Revision 1 Revision Date February 7, 2017 MARGARETA card management system is a product of Noreg Ltd. Noreg Ltd. web: e-mail: Address: www.noreg.hu info@noreg.hu H-1118 Budapest,

More information

Install and Issuing your first Full Feature Operator Card

Install and Issuing your first Full Feature Operator Card Install and Issuing your first Full Feature Operator Card Install S-Series versasec.com 1(28) Table of Contents Install and Issuing your first Full Feature Operator Card... 3 Section 1: Install and Initial

More information

Hardware Acceleration for Tagging

Hardware Acceleration for Tagging Parallel Hardware Parallel Applications IT industry (Silicon Valley) Parallel Software Users Hardware Acceleration for Tagging Sarah Bird, David McGrogan, John Kubiatowicz, Krste Asanovic June 5, 2008

More information