Complete solution for chip cards preparing, personalization and applying M.Sc. GORAN KUNJADIĆ SIP Software and Services, Beograd,

Slides:



Advertisements
Similar presentations
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Advertisements

Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
© Copyrights 1998 Algorithmic Research Ltd. All rights Reserved D a t a S e c u r i t y A c r o s s t h e E n t e r p r i s e Algorithmic Research a company.
Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
Gareth Ellis Senior Solutions Consultant Session 5a Key and PIN Management.
McAfee One Time Password
Multi-Application in Smart Card-based Devices Christophe Colas, Chief Software Architect August 2002.
A Profile Of PKCS #11 V2.11 For Mobile Devices Magnus Nyström PKCS Workshop 2002.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
SafeNet Luna XML Hardware Security Module
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Page 1 Dorado 400 Series Server Club Page 2 First member of the Dorado family based on the Next Generation architecture Employs Intel 64 Xeon Dual.
CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001.
PKI Technology & Interoperability Lisa Pretty Executive Director.
Wireless Applications Squeak & Croquet Bo Li Auburn University Research Spring 2006.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Mobile Payment Solutions and the EMV/PCI Impact
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Athena Smartcard Solutions June 2009 Smart Card Technology and Security Leaders.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Certificate and Key Storage Tokens and Software
Microcrypt Technologies SPACER Secure Physical Access Control Enhanced Reader for contactless cryptographic smart cards.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design
Smart Cards By Simon Siu and Russell Doyle Overview Size of a credit card Small embedded computer chip – Memory cards – Processor cards – Electronic.
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
How can the SMART card help in new channels?
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Protecting Data on Smartphones and Tablets from Memory Attacks
The mobile environment is constantly changing.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Chapter 3 Installing Windows XP Professional. Preparing for installation Pre-installation requirement; ◦ Hardware requirements ◦ Hardware compatibility.
Is Proud to Offer…. Everything You Could Wish For In Instant Card Issuance Security Speed Simplicity The Card Genie ™ System.
Smart Card Technology & Features
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
1 DMP: A proposal for Security Manager Interface Sergio Sagliocco Victoria Alvaro SecureLab, Technology Department.
By Brian Sutherland and Chou Peter Hoang
HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007 Aladdin Knowledge Systems. Yariv Drory International.
Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Secure Sharding.
Ruby Manager Overview Copyright 2006 VeriFone, Inc. All rights reserved. No part of this publication may be copied, distributed, stored in a retrieval.
1 Victor Chan NBS Card Technology, MIST Inc. August 21, 2002 Personalization of Multi-Application Smart Card.
TCS Internal Security. 2 TCS Internal Objective Objective :  Android Platform Security Architecture.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Wisecard Technology Co., Ltd EMV Chip Card Issuance System--- SmartPersoWare.
JAVA CARD Presented by: MAYA RAJ U C A S,PATHANAMTHITTA.
Innovation is Our Passion Online Banking Past, Present and Future.
Chapter 4. CONCEPT OF THE OPERATING SYSTEM MANAGING ESSENTIAL FILE OPERATIONS.
PV204 Security technologies
Transaction Flow end-end
Mag stripe to Smart Card: EMV Issuance Process
Atoll Solutions PVT LTD
Hardware Cryptographic Coprocessor
Secrets Between Just You and Me
Public Key Infrastructure from the Most Trusted Name in e-Security
RKL Remote key loading.
This is a typical Windows user desktop
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Operating System Introduction.
Presentation transcript:

Complete solution for chip cards preparing, personalization and applying M.Sc. GORAN KUNJADIĆ SIP Software and Services, Beograd, M.Sc. ZORAN ŽIVKOVIĆ SIP Software and Services, Beograd, Regional Chamber of Economy, Niš

Preparation of card personalization CMS - Card Management System PIN Management System Crypto Solutions Data Preparation Key Management Card Issuing system HSM module programming HASP solutions Xpressi solution Regional Chamber of Economy, Niš

CMS - Card Management System Adaptability Flexibility Scalability Regional Chamber of Economy, Niš

PIN Management System Harware generating random PIN PIN suitability checking Secure PIN storing PIN encrypting Secure PIN mailing Regional Chamber of Economy, Niš

HSM module programming Random Key Generating: DES, AES, RSA… Token and Slot creating and initializing Secure algorithm executing Secure file/string encryption/decryption Random Number Generating Regional Chamber of Economy, Niš

Data Preparation - UbiQPersoMaster™ Data preparing for chip personalization EMV software solutions that work across personalization equipment platforms The core architecture of UbiQPersoMastersoftware provides the ability to support any smart card platform and application and most brands of personalization equipment. Regional Chamber of Economy, Niš

Key Management - UbiQKeyMaster™ Cryptograhic Key Generating KeyVault - Key storing UbiQKeyMaster provides cryptographic key and certificate management services for smart card personalization systems, including systems that utilize personalization files. UbiQKeyMaster provides an easy-to-use graphical user interface that allows a security officer to organize, create, store, import, export, inactivate, and suspend Des Keys, Public/Private Key Pairs, and Certificates. Regional Chamber of Economy, Niš

Card Issuing system - UbiQCardIssue™ The final step in the personalization lifecycle is the actual issuance of the cards. The NBS CardIssue™ application runs on a computer attached to your issuing device of choice and manages the smart card personalization process. It incorporates an open system architecture, providing the Issuer with a single application that can support all products defined by CardPlan™ and all data prepared by DataPrep™. In addition, the application supports a library of personalization devices and chip operating systems. Regional Chamber of Economy, Niš

Remote & branch issuance solution - Maximize your options with Xpressi the distributed / remote / branch instant card issuance software developed by our in-house group of software developers. Xpressi is part of our patented UbiQPersoMaster™ family of software products Xpressimakes EMV/ chip card branch instant issuance a cost effective reality and easy to implement. Supporting multiple EMV / chip card configurations, chip types and even printer brands with one system, this solution gives an issuer the flexibility to keep their future expansion and operation options open for change while not getting locked in to any one card or printer supplier. Regional Chamber of Economy, Niš

Crypto Solutions - PocketCryptoSW Secure algorithm Key management User Management Multi functionality Regional Chamber of Economy, Niš

Hardware Against Software Piracy HASP solutions Sample application Regional Chamber of Economy, Niš

Data/System security solutions McAfee Security Solutions PCI DSS Evaluation Regional Chamber of Economy, Niš

Cards supplement Thames Card Technology Regional Chamber of Economy, Niš

Personalization equipment NBS Technologies – Bureau personalization equipment Horizon Evolution Regional Chamber of Economy, Niš

Personalization equipment NBS Technologies - Javelin - Desktop personalization printers Advantage 2000 M2/M3 Advantage M20 CX-330 Javelin J360i Regional Chamber of Economy, Niš

Fields of applying Bank Cards SIM Cards ID Cards Access Control Cards Regional Chamber of Economy, Niš

THANK YOU FOR ATTENTION ! Contact: SIP Software and Services Bul. Vojvode Mišića 37, Beograd Regional Chamber of Economy, Niš